fg imt-2020: report on standards gap analysis 6 - td 208 (plen/13) 3.1.18 equipment [b-itu-t...
TRANSCRIPT
Contact: Peter Ashwood-Smith
Huawei Technologies
Email: [email protected]
Attention: Some or all of the material attached to this liaison statement may be subject to ITU copyright. In such a case this will be
indicated in the individual document.
Such a copyright does not prevent the use of the material for its intended purpose, but it prevents the reproduction of all or part of it in a
publication without the authorization of ITU.
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 13
TELECOMMUNICATION
STANDARDIZATION SECTOR
STUDY PERIOD 2013-2016
TD 208 (PLEN/13)
English only
Original: English
Question(s): All/13
TD
Source: Chairman, FG IMT-2020
Title: FG IMT-2020: Report on Standards Gap Analysis
Report on Standards Gap Analysis
Summary
This deliverable provides the report of standards gap analysis as a final output document from ITU-
T Focus Group on IMT-2020, FG IMT-2020. Appendices of this deliverable are attached as output
documents for five study areas, high-level network architecture, end-to-end QoS framework,
emerging network technologies, mobile front haul and back haul, and network softwarization.
Keywords
IMT-2020, Mobile front haul, Mobile back haul, Network Softwarization, QoS, QoE, ICN, CCN,
Network Performance, QoS parameters, QoS classes
Introduction
This deliverable is the final output report from Focus Group on IMT-2020, FG IMT-2020, which
was established at ITU-T SG13 meeting in April 2015, and worked from June to October 2015. It
reports standards gap analysis based on the studies on several key technical topics related non-radio
parts of IMT-2020.
- 2 -
TD 208 (PLEN/13)
Table of Contents
1 Scope ............................................................................................................................. 4
2 References ..................................................................................................................... 4
3 Definitions .................................................................................................................... 4
3.1 Terms defined elsewhere ................................................................................ 4
3.2 Terms defined in this Deliverable .................................................................. 7
4 Abbreviations and acronyms ........................................................................................ 7
5 Conventions .................................................................................................................. 9
6 Executive Summary ...................................................................................................... 9
7 Gap analysis and recommendations to parent group .................................................... 14
7.1 High-level Architecture .................................................................................. 14
7.1.1 Standardization gaps on High-level Architecture ........................................... 14
7.1.2 Recommendations to parent group on High-level Architecture ..................... 19
7.2 Network Softwarization .................................................................................. 19
7.2.1 Standardization gaps on Network softwarization ........................................... 19
7.2.2 Recommendations to parent group on Network softwarization ..................... 27
7.3 End-to-end QoS .............................................................................................. 27
7.3.1 Standardization gaps on end-to-end QoS ....................................................... 27
7.3.2 Recommendations to parent group on End-to-end QoS ................................. 30
7.4 Mobile front haul and back haul ..................................................................... 30
7.4.1 Standardization gaps on Mobile front haul and back haul ............................. 30
7.4.2 Recommendations to parent group on Mobile front haul and back haul ....... 34
7.5 Emerging Network Technologies ................................................................... 35
7.5.1 Standardization gaps on Emerging Network Technologies ........................... 35
7.5.2 Recommendations to parent group on Emerging Network Technologies ...... 40
8 Conclusion and future work .......................................................................................... 40
Bibliography............................................................................................................................. 42
Appendix I: High-level Architecture ....................................................................................... Error!
Bookmark not defined.
Appendix II: Network Softwarization ...................................................................................... 63
Appendix III: End-to-end QoS ................................................................................................. 110
Appendix IV: Mobile front haul and back haul ....................................................................... 130
Appendix V: Emerging Network Technologies....................................................................... 153
- 4 -
TD 208 (PLEN/13)
The report of Standards Gap Analysis
1 Scope
This deliverable provides the report of standards gap analysis as a final output document from
ITU-T Focus Group on IMT-2020, FG IMT-2020. Appendices1 of this deliverable are attached as
output documents for five study areas: high-level network architecture, an end-to-end quality of
service (QoS) framework, emerging network technologies, mobile front haul and back haul, and
network softwarization.
2 References
None
3 Definitions
3.1 Terms defined elsewhere
This Deliverable uses the following terms defined elsewhere:
3.1.1 IMT-2020 [b-ITU-R M-2083-0]: systems, system components, and related aspects that
support to provide far more enhanced capabilities than those described in Recommendation ITU-R
M.1645.
3.1.2 Peak data rate [b-ITU-R M-2083-0]: the maximum achievable data rate under ideal
conditions per user/device (in Gbit/s).
3.1.3 User experienced data rate [b-ITU-R M-2083-0]: the achievable data rate (in Mbit/s or
Gbit/s) that is available ubiquitously2 across the coverage area to a mobile user/device.
NOTE - The term “ubiquitous” is related to the considered target coverage area and is not intended
to relate to an entire region or country.
3.1.4 Latency [b-ITU-R M-2083-0]: the contribution by the network to the difference in time (in
ms). between when the source sends a packet and when the destination receives it.
3.1.5 Mobility [b-ITU-R M-2083-0]: from a performance target point of view, mobility is the
maximum speed (in km/h) at which a defined QoS and seamless transfer can be achieved between
radio nodes, which may belong to different layers and/or radio access technologies (multi-layer/-
RAT).
1 Note: The appendices contain documents that were produced during the FG-IMT 2020 focus
group in order to investigate gaps in standardization related to IMT-2020. While the request from
SG-13 was to deliver a report outlining standardization gaps, the consensus of the focus group
was that the working documents produced and used during the focus group work contained
useful information for future work and should be captured. Note, however, the focus group
concentrated on producing accurate descriptions of the standardization gaps in the main body of
this document; some typographical errors may exist in the appendices. They are, however, the
output of the focus group but are provided for information only.
- 5 -
TD 208 (PLEN/13)
3.1.6 Connection density [b-ITU-R M-2083-0]: the total number of connected and/or accessible
devices per unit area (e.g. per km2).
3.1.7 Energy efficiency [b-ITU-R M-2083-0]: energy efficiency has two aspects:
on the network side, energy efficiency refers to the quantity of information bits transmitted
to and received from users, per unit of energy consumption of the radio access network
(RAN) (in bit/Joule);
on the device side, energy efficiency refers to quantity of information bits per unit of energy
consumed (in bit/Joule) by the communication module.
3.1.8 Spectrum efficiency [b-ITU-R M-2083-0]: the average data throughput per unit of the
spectrum resource and per cell (measured in bit/s/Hz).
Note: - A cell is a radio coverage area over which a mobile terminal can maintain a connection with
one or more units of radio equipment located within that area. For an individual base station, this is
the radio coverage area of the base station or of a subsystem (e.g. sector antenna).
3.1.9 Area traffic capacity [b-ITU-R M-2083-0]: the total traffic throughput served per
geographic area (in Mbit/s/m2)
3.1.10 future network (FN) [b-ITU-T Y.3001]: A network able to provide services, capabilities,
and facilities difficult to provide using existing network technologies. A future network is either:
a) A new component network or an enhanced version of an existing one, or,
b) A heterogeneous collection of new component networks or of new and existing component
networks that is operated as a single network.
NOTE – The plural form "Future Networks" (FNs) is used to show that there may be more than one
network that fits the definition of a future network.
3.1.11 network virtualization [b-ITU-T Y.3011]: A technology that enables the creation of
logically isolated network partitions over shared physical networks so that heterogeneous collection
of multiple virtual networks can simultaneously coexist over the shared networks. This includes the
aggregation of multiple resources in a provider and appearing as a single resource
3.1.12 software-defined networking [b-ITU-T Y.3030]: A set of techniques that enables to directly
program, orchestrate, control and manage network resources, which facilitates the design, delivery
and operation of network services in a dynamic and scalable manner.
3.1.13 energy saving within networks [b-ITU-T Y.3021]: This is where network capabilities and
their operations are set up in a way that allows the total energy for network equipment to be
systematically used in an efficient manner, resulting in reduced energy consumption compared with
networks that lack these capabilities and operations.
NOTE – Network equipment includes routers, switches, equipment at the terminating point e.g., optical
network units (ONUs), home gateways, and network servers such as load balancers and firewalls. Network
equipment is typically composed of various components such as switching fabric, line cards, power supply,
and cooling.
3.1.14 cloud service customer [b-ITU-T Y.3501]: A person or organization that consumes
delivered cloud services within a contract with a cloud service provider.
3.1.15 cloud service provider [b-ITU-T Y.3501]: An organization that provides and maintains
delivered cloud services.
3.1.16 management system [b-ITU-T M.60]: A system with the capability and authority to exercise
control over and/or collect management information from another system.
3.1.17 device [b-ITU-T Y.3021]: This is the material element or assembly of such elements intended
to perform a required function.
- 6 -
TD 208 (PLEN/13)
3.1.18 equipment [b-ITU-T Y.3021]: A set of devices assembled together to form a physical entity
to perform a specific task.
3.1.19 virtual resource [b-ITU-T Y.3011]: An abstraction of physical or logical resource, which may
have different characteristics from the physical or logical resource and whose capability may not be
bound to the capability of the physical or logical resource.
3.1.20 logical resource [b-ITU-T Y.3011]: An independently manageable partition of a physical
resource, which inherits the same characteristics as the physical resource and whose capability is
bound to the capability of the physical resource.
NOTE – "independently" means mutual exclusiveness among multiple partitions at the same level.
3.1.21 resource management [b-ITU-T Y.3520]: The most efficient and effective way to access,
control, manage, deploy, schedule and bind resources when they are provided by service providers
and requested by customers.
3.1.22 hypervisor [b-ITU-T Y.3510]: A type of system software that allows multiple operating
systems to share a single hardware host.
NOTE –Each operating system appears to have the host's processor, memory and other resources, all to itself
3.1.23 virtual machine [b-DMTF OVF]: The complete environment that supports the execution of
guest software.
3.1.24 identifier [b-ITU-T Y.2091]: An identifier is a series of digits, characters and symbols or any
other form of data used to identify subscriber(s), user(s), network element(s), function(s), network
entity(ies) providing services/applications, or other entities (e.g., physical or logical objects).
3.1.25 locator [b-ITU-T Y.2015]: A locator is the network layer topological name for an interface or
a set of interfaces. Locators are carried in the IP address fields as packets traverse the network.
NOTE – In Recommendation ITU-T Y.2015, locators are also referred to as location IDs.
3.1.26 node ID [b-ITU-T Y.2015]: A node ID is an identifier used at the transport and higher layers
to identify the node as well as the endpoint of a communication session. A node ID is independent of
the node location as well as the network to which the node is attached so that the node ID is not
required to change even when the node changes its network connectivity by physically moving or
simply activating another interface. The node IDs should be used at the transport and higher layers
for replacing the conventional use of IP addresses at these layers. A node may have more than one
node ID in use.
NOTE – Recommendation ITU-T Y.2015 specifies a node ID structure.
3.1.27 name [b-ITU-T Y.2091]: A name is the identifier of an entity (e.g., subscriber, network
element) that may be resolved/translated into address.
3.1.28 domain [b-ETSI NFV MANO]:
Administrative domain is a collection of systems and networks operated by a single organization or
administrative authority. Infrastructure domain is an administrative domain that provides virtualized
infrastructure resources such as compute, network, and storage or a composition of those resources
via a service abstraction to another administrative domain, and is responsible for the management
and orchestration of those resources. .
NOTE1: Different networks and different parts of a network may be built as different domains
using separate technologies or having different control paradigms,
NOTE2: Different networks and different parts of a network may be owned by a single
administration creating an administrative domain. Services are enabled and managed over multiple
administrations or over multi-domain single administration.
- 7 -
TD 208 (PLEN/13)
NOTE3: A multitenancy domain refers to set of physical and /or virtual resources in which a single
instance of a software runs on a server and serves multiple tenants. A tenant is a group of users who
share a common access with specific privileges to the software instance. A service or an application
may be designed to provide every tenant a dedicated share of the instance including its data,
configuration, user management, tenant individual functionality and non-functional properties.
3.2 Terms defined in this document
This document defines the following terms:
3.2.1 Network Softwarization: Network softwarization is an overall transformation trend for
designing, implementing, deploying, managing and maintaining network equipment and network
components by software programming, exploiting characteristics of software such as flexibility and
rapidity of design, development and deployment throughout the lifecycle of network equipment and
components, for creating conditions that enable the re-design of network and services architectures;
allow optimization of costs and processes; and enable self-management.
3.2.2 back haul: the network path connecting the base station site and the network controller or
gateway site.
3.2.3 front haul: the intra-base station transport, in which a part of the base station function is
moved to the remote antenna site. (Note that this definition is equivalent to the definition given in
MEF 22.1.1 for the current 4G technology.)
4 Abbreviations and acronyms
This document uses the following abbreviations and acronyms:
Ed: Not complete.
5G The fifth generation mobile network
AAA Authentication, Authorization, Accounting
APN Application Network
AR Augmented Reality
BH back haul
CCN Content Centric Networking
CGF Converged Gateway Function
CN Core Network
CPRI Common Public Radio Interface
C-RAN Cloud RAN
CS Content Store
D2D Device-to-device
D2N Device-to-Network
DBA Dynamic Bandwidth Assignment
DWDM Dense Wavelength Division Multiplex
E2E End-to-End
- 8 -
TD 208 (PLEN/13)
EPC Evolved Packet Core
FH front haul
FIB Forwarding Information Base
GBR Guaranteed Bit Rate
GW Gateway
GTP Generic Tunnelling Protocol
GTP-C GTP Control
ICN Information Centric Networking
IDC Internet Data Center
IMT International Mobile Telecommunications
IoT Internet of Things
IP Internet Protocol
IPDV IP packet Delay Variation
IPER IP packet Error Rate
IPLR IP packet Error Ratio
IPTD IP packet Transfer Delay
KPI Key Performance Index
LINP a logically isolated network partitions
LISP Location/Identity Separation Protocol
MBR Maximum guaranteed Bit Rate
MIMO Multiple-Input and Multiple-Output
MEC Mobile Edge Computing
MNO Mobile Network Operator
MPLS Multi-Protocol Label Switching
MTC Machine Type Communication
NAS Non-Access Stratum
NDN Named Data Networking
NFV Network Function Virtualization
NP Network Performance
OAM Operation, Administration and Management
OBSAI Open Base Station Architecture Initiative
ODN Optical Distribution Network
OSU Optical Subscriber Unit
OTN Optical Transport Network
PDN Packet Data Network
- 9 -
TD 208 (PLEN/13)
PGW Packet Data Network Gateway
PIF Protocol Independent Forwarding
PIT Pending Interest Table
POF Protocol Oblivious Forwarding
PON Passive Optical Network
PTN Packet Transport Network
QCI QoS Class Identifier
QoE Quality of Experience
QoS Quality of Service
RAN Radio Access Network
RAT Radio Access Technologies
RoF Radio over Fiber
TSDN Transport SDN
TWDM Time and Wavelength Division Multiplex
SDN Software Defined Networking
SR Segment Routing
UCF Unified Control Function
UE User Equipment
UHD Ultra High Definition
UMTS Universal Mobile Telecommunication System
UNI User Network Interface
VLAN Virtual LAN (Local Area Network)
VM Virtual Machine
VNF Virtual Network Function
VPN Virtual Private Network
WDM Wavelength Division Multiplex
5 Conventions
Within the context of this document, the term IMT-2020 refers to the technology and networks
defined for future mobile networking. Within the telecommunications industry this is commonly
referred to “fifth generation mobile networking”, or simply 5G. For the purposes of this document,
IMT-2020 and 5G are synonymous.
6 Executive Summary
The purpose of this document is to provide recommends to the ITU-T on the requirements for
standardization related to the wireline elements of “fifth generation mobile” (5G) or more properly
- 10 -
TD 208 (PLEN/13)
referred to as IMT-2020) networks as per the terms of reference of this focus group. It is not a
purpose of this document to provide a large amount of tutorial/overview material but instead to
reference the copious amounts of such material where necessary and to give sufficient context that
experts in the various fields can understand what gaps are being identified.
While the breadth of the document is wide we do not claim to have covered every possible aspect of
IMT-2020 wireline networking, indeed IMT-2020 is a large and moving target and therefore we
have had to extrapolate in many areas what we believe the wireline requirements will be and what
standards are missing or need improvement. There are definitely areas we have missed that will
require further study and some of these are outlined as gaps in this gap analysis.
IMT-2020 systems will differentiate themselves from fourth generation (4G) systems not only
through further evolution in radio performance but also through greatly increased flexibility end-to-
end. This end-to-end flexibility will come in large part from the incorporation of softwarization into
every component. Well known techniques such as SDN, NFV and cloud computing will together
allow unprecedented flexibility in the IMT-2020 system. Such flexibility will enable many new
capabilities including network slicing.
The following figure gives a broad view of key areas that require study to effectively determine all
the wireline gaps.
Figure 1: Focus Group IMT 2020 wire line potential gap analysis areas
Since the primary purpose of the focus group is to generate a list of gaps/recommendations the
reader will find this list of gaps and recommendations immediately after this executive summary.
Following the list of gaps/recommendations the reader will find the detailed work sub topics as
appendices.
- 11 -
TD 208 (PLEN/13)
This focus group has looked at the following wireline aspects of IMT-2020 and has studied each in
some detail and produced detailed gaps related to each subject. Due to the short and fixed duration
of the Focus Group, there will be some areas, one example is security, which not have been
addressed. This should also be considered when formulating possible new work on standardization
topics.
A – High level architecture – This study focused on major requirements of IMT-2020 and the
analyses of technical gaps to satisfy them. The gaps identified some of the major challenges in
IMT-2020 including the diversities in requirements, particularly in bandwidth, mobility, and
signalling. The flexibility of the architecture, the tight integration of various radio access networks
as well as fixed access networks, end-to-end OAM, among others, are also identified as essential
requirements in IMT-2020. Finally, the study provides a high-level network architecture based on
the analysis of the requirements, which will be more elaborated or changed in the standardization
phases.
Figure 2 provides an overall view of the architecture.
Figure 2: Network architecture for IMT-2020 networks
.
B – Network softwarization – Network softwarization is an overall transformation trend for
designing, implementing, deploying, managing and maintaining network equipment and network
components by software programming, exploiting characteristics of software such as flexibility and
rapidity of design, development and deployment throughout the lifecycle of network equipment and
components, for creating conditions that enable the re-design of network and services architectures;
allow optimization of costs and processes; and enable self-management. All these bring added value
- 12 -
TD 208 (PLEN/13)
to network infrastructures. The terminology, Network Softwarization, was first introduced in
Academia, at the NetSoft conference in 2015, the first IEEE Conference on Network
Softwarization, to include broader interests regarding Software Defined Networking (SDN) and
Network Functions Virtualization(NFV),Network Virtualization, Mobile Edge Computing, Cloud
and IoT technologies.
Figure 3 provides an overall view of network softwarization in IMT-2020 networks.
Figure 3: Network softwarization view of IMT-2020 mobile networks
C – End-to-End QoS – This work focused on how the wireline network together with the wireless
network can provide guaranteed end-to-end QoS. It provides a survey of various white papers on
the subject and identifies differences in how QoS is defined/measured etc. across the different
organizations. In addition to a conventional QoS standardization approach, IMT-2020-specific use
cases need new approaches in areas of definition of end-to-end connectivity supervision and
integrity, QoS parameters, performance objectives, QoS classification, budget allocation,
measurement/monitoring methodology, etc. These gaps identify device-to-device/device-to-network
QoS requiring additional standardization.
Figure 4 provides an overall view of end-to-end QoS for both wireless and wireline networks.
- 13 -
TD 208 (PLEN/13)
Figure 4: The scope end-to-end QoS standardization for 3GPP (Red) and ITU-T Standards (Purple)
D – front haul/back haul – This work focused on the different transport aspects of the IMT-2020
wireline network. front haul refers to the intra-base-station transport, where part of the base station
function is moved to the remote antenna site. Back haul is the packet based communications
between the base stations and the various entities that make up the packet processing elements of a
core network. This work focuses almost exclusively on the front haul because this is where the
majority of the gaps occur. The front haul analysis looks in detail at the projected IMT-2020
bandwidth requirements of a current C-RAN architecture and various architectural variants thereof.
Most of the gaps revolve around the need to optimize the front haul network, either to reduce/right-
size the bandwidth demands or to increase/optimize the bandwidth supply. An example of the
former is to allow front haul to reduce bandwidth capacity when there is not much data being
transmitted or received from a given remote site. An example of the latter is to use more advanced
transport solutions that are tailored to the front haul application and optimized for low power, low
fiber-count, and low cost. The back haul gaps however seem limited to the successful handling of
network timing and synchronization, and low latency; as well as improvements in power
consumption. All of these suggest gaps in the current standardized technology, many of which are
already being addressed by work going on in ITU-T SG15 and various groups in the IEEE. The
basic recommendation on FH/FB to SG13 is to establish liaison to all these established groups to
better coordinate their efforts.
Figure 5 provides an overall view of the front haul in FMT-2020 networks.
Figure 5: IMT-2020 front haul
E- Emerging Network Technologies – This work focused on the network requirements of IMT-
2020 to support enhanced mobile broadband, massive machine-type communications, and ultra-
reliable low-latency communications. The work specifically looked at Information Centric
Networking (ICN) protocols as possible emerging technologies to meet these needs. Current
research shows ICN is possible technology that can provide benefits for IMT-2020 network
supporting very large-scale heterogeneous devices, IoT networks, new mobility models, edge
computing, and end device self-configuration. Because ICN is a flexible networking architecture,
The study scoped the ICN gaps with several incremental deployment options, as described in
Appendix V. In clause 7.5, standardization gaps have been identified for ICN deployment in IMT-
- 14 -
TD 208 (PLEN/13)
2020. The basic recommendation on Emerging Network Technologies such as ICN, to SG13 is to
establish liaison to IETF ICNRG, universities and research organizations to further feasibility
studies.
7 Gap analysis and recommendations to Study Group 13
7.1 High-level Architecture
7.1.1 Standardization gaps for the IMT-2020 high-level architecture
The gaps included in this clause were extracted from the output of the high-level architecture gap
analysis work included in Appendix I.
Gap A.1. Various bandwidth/data-rates demands Priority: High
Description: The current network architecture is not appropriate to support various bandwidth
demands, from ultra-high to extremely low, required for IMT-2020 and beyond. Enhancement of
the network architecture should be studied to make IMT-2020 network more flexible and resilient
with enhanced capabilities including the upgrades to session or bearer management, more efficient
multicast methods, distributed function deployment, network slicing, and efficient codecs.
Related work: 3GPP, SG13
Gap A.2. Complex connectivity model Priority: High
Description: Local offloading can be used to support efficient traffic distribution. However, local
offloading requires a separate local mobile GW in existing IMT networks, which also brings up the
need to support multiple APN connectivity in user devices or initiate APN switching, which may
result in service disruption of on-going sessions and operational complexities.
The network architecture for IMT-2020 should be studied to eliminate the need for separate local
mobile specific gateways, additional APN and associated signalling.
Related work: 3GPP, SG13
Gap A.3. Application-aware and distributed network architecture Priority: High
Description: The heavily centralized architecture of existing IMT networks is should be changed to
cope with the explosion of mobile data traffic. In IMT-2020 networks, therefore, gateways to an
IMT-2020 core network can be flexibly located closer to the cell sites, which will bring a significant
reduction on back haul and core network traffic by enabling placing content servers closer to mobile
devices and also be beneficial to the latency of the services.
The IMT-2020 core network, therefore, is envisioned to be a distributed network being composed
of the multiple distributed gateways. The architectural changes expected from the distributed
network, including the point-to-point access architecture between a UE and a service network in
existing IMT network, should be studied.
Related work: 3GPP, SG13
- 15 -
TD 208 (PLEN/13)
Gap A.4. Signalling complexity in massive MTC Priority: High
Description: The IMT-2020 network should address architectural issues coming from the massive
number of MTC devices. The traffic generated by a very large number of connected devices
typically will be a relatively low volume of non-delay-sensitive data; however, the traffic is
characterized as intermittent short burst traffic. The main problem in supporting the intermittent
short burst traffic is that traffic has to go through the full signalling procedure, which causes the
waste of battery life, spectrum and network capacity. The enhancement of current monolithic bearer
management and the accompanied signalling in IMT-2020 network should be studied to cope with
the issues coming from the increase of terminals.
Related work: 3GPP, SG13
Gap A.5. Increasing service availability Priority: High
Note: from second call, confirmation to be confirmed. (via email)
Description: IMT-2020 networks should offer several ways to increase service availability by
using the ability to replicate content and service functions and the use of forwarding functions for
short and long term caching. In addition, delay-tolerant networking aspects, such as cache-and-
forward, are very useful in the last mile where the content objects can be opportunistically pushed
to or pulled by the end user based on its wireless conditions. The IMT-2020 network architecture
should study methods to increase service and content availability.
Related work: IETF, SG13
Gap A.6. Signalling to reduce end-to-end complexity Priority: High
Description: There are various signalling procedures that contribute to the end-to-end connectivity
establishment involving all network components such as the radio interface, the front haul/back haul
and the mobile core network. Besides the transport delay through the network components,
signalling which is basically accompanied in the beginning of each new session or transmission may
have more serious impacts on total end-to-end latency. For IMT-2020 and beyond, more efficient
signalling protocols or systems should be studied to cope with the limitations on the existing mobile
systems.
Related work:
Gap A.7. End-to-end network latency model Priority: High
Description: Latency studies carried out on many IMT-Advanced deployed networks demonstrate
that the 3GPP specification provides adequate guidelines, while actual IMT-Advanced network
performance varies due to many variables and adjacent ecosystems. Similarly, a network latency
- 16 -
TD 208 (PLEN/13)
model and an end-to-end latency budget for services should be studied so that it provides optimal
performance for many diverse applications in IMT-2020 networks.
Related work: 3GPP, SG13
Gap A.8. Mobile network optimized softwarization architecture Priority: High
Description: The softwarization, has been initially designed for wired networks and it may not be
optimized for mobile networks. The mobile network optimized softwarization should be studied
considering the best use of existing features to overcome the performance issues which may arise
in some of SDN solutions.
Related work: SG13
Gap A.9. Data plane programmability Priority: Medium
Description: The requirements of the data plane in an IMT-2020 network will vary depending on
the service characteristics of new emerging services such as ICN. In-network data processing and
service provisioning are the capabilities to cope with the diverse requirements of the data plane.
However, the capabilities have not studied from mobile network perspective. The capabilities to
support easier provisioning of new emerging services in IMT-2020 architecture should be studied.
Related work:SG13
Gap A.10. End-to-end QoS framework Priority: High
Description: Discussions on QoS requirements of current IMT networks mostly focus on QoS at the
RAN. An end-to-end (i.e. from a user device to another corresponding user device) QoS framework
should be considered in the design of IMT-2020 network architecture.
Related work: SG12, SG13
Gap A.11. Energy efficiency Priority: High
Description: Energy efficiency should be considered in the beginning of the design of new IMT-
2020 network architecture. While only a subset of total functions in IMT-2020 networks can be
virtualized, the function virtualization and its dynamic management of virtualized functions are
expected to contribute to the significant saving of energy. Energy efficiency should be defined first
and then the measurement method also should be studied for IMT-2020 network. In addition, energy
efficiency from life cycle management point of view should be studied.
Related work: SG5, ISO 14000 Series
- 17 -
TD 208 (PLEN/13)
Gap A.12. Enhancement of privacy and security Priority: High
Description: IMT-2020 networks should have the capabilities of determining and providing the level
of privacy and security required of user devices and application services. Therefore, the security and
privacy should be well considered in the network architecture design.
Related work: 3GPP, SG13, SG17
Gap A.13. Enhancement identity management Priority: High
Description: As IMT-2020 networks also aim to realize features of future network architectures and
enabling services, the goal of identity management and associated security and privacy requirements
should go beyond device identity to also include service, content, or other principles. The major
functionalities may include identifier (ID) assignment, name translation, ID certification, name
resolution, and related key distribution management. This is particularly important when these IDs
are administered by third parties which are open to service/control/forwarding functions in the IMT-
2020 network, in which case the requirements of the stake-holders have to be taken into account.
Related work: SG13 Y.2720, SG17, JCA-IdM, ISO/IEC JTC1 SC27
Gap A.14. Multi-RAT connectivity Priority: High
Description: Different radio interfaces have been defined by many different standardization
organizations, which leads to complex and coarse-level of interworking in existing IMT networks.
The signalling on different radio access networks is independent, resulting in inevitable duplications
in signalling for attachment, authentication, and mobility in each radio access networks. Although
traffic steering and the selection of best access technology in existing IMT networks is considered,
more flexible and optimized multi-RAT interworking architecture should be studied, which may
also affect the design of IMT-2020 network architecture. The multi-connectivity through the
multiple available radio access networks improves the robustness of the network as well as the
throughput performance.
Related work: 3GPP, SG13
Gap A.15. Fixed mobile convergence Priority: High
Description: Fixed access networks3 should be considered as an access network of IMT-2020 to
interwork with other radio access networks. A converged access-agnostic core (i.e., where identity,
mobility, security, etc. are decoupled from the access technology), which integrates fixed and mobile
core, is envisioned as a direction of IMT-2020. Therefore, the IMT-2020 network architecture
3 A fixed network means a wireline network. A Wi-Fi network is regarded as another radio access
network in this document.
- 18 -
TD 208 (PLEN/13)
should be studied to support true fixed and mobile convergence ensuring a seamless user experience
within the fixed and mobile domains.
Related work: 3GPP, SG13
Gap A.16. Flexible mobility Priority: High
Description: It is expected that mobility requirements for user devices will vary depending on the
device and/or application types. Many user devices are stationary, e.g., smart meters and CPE, even
in mobile networks while fast handover is a key feature of most mobile devices and some
applications may address the mobility by setting up a new connection automatically with the help
of buffering. The signalling procedure in existing IMT networks is heavy and not optimized for
some emerging new services such as IoT. An enhanced mobility architecture should be studied to
support “context-aware mobility” considering device types, application characteristics, etc. as the
context for the mobility.
Related work: 3GPP, SG13
Gap A.17. Mobility management for distributed flat network Priority: High
Description: As the IMT-2020 core network is envisioned to be a flat distributed network, which is
composed of the multiple distributed gateways to cope with traffic explosion and latency
requirements of applications, mobility management should be studied aligning with those
architectural changes.
Related work: 3GPP, SG13
Gap A.18. End-to-end network management in a multi-domain environment Priority: High
Description: Multiple network management protocols in different network domains make it difficult
to support unified network operations over multiple network domains. A unified end-to-end network
management should be considered to ensure compatibility and flexibility for the operation and
management of an IMT-2020 network.
Related work: SG13
Gap A.19. OAM protocols Priority: High
Description: OAM protocols are not standardized in some parts of IMT networks such as the front
haul network. Standard OAM protocols should be studied for fault management and performance
management between network equipment that may be commonly used across the IMT-2020
network.
Related work:
- 19 -
TD 208 (PLEN/13)
7.1.2 Recommendations to parent group on High-level Architecture
It is recommended that SGs in ITU-T would study and develop specifications of detailed IMT-2020
reference framework, and validate against requirements and solutions for the gaps identified from
the viewpoint of IMT-2020 high-level architecture, which are shown in previous sub clause. It is
also recommended that SG13 should frequently communicate to the related SDOs, to minimize
duplicated work and maximize synergy effects with other SDOs.
7.2 Network Softwarization
7.2.1 Standardization gaps on Network softwarization
The gaps included in this clause were extracted from the output of the network softwarization gap
analysis work included in Appendix II.
Note: The gap reference refers to the respective clause in Appendix II.
Gap B.6.2.1: Efficient accommodation of various applications Priority: High
Description: It is envisioned that such an infrastructure that efficiently supports a diversified set of
application requirements across end-to-end paths, ranging from M2M communication, to
autonomous and collaborative driving, virtual reality and video streaming, etc. Network
softwarization technologies including SDN, NFV and their extensions for supporting IMT-2020
mobile networks are expected to provide slicing capability both in wired and wireless parts of
communication infrastructure, so that each slice provides an isolated environment to efficiently
accommodate individual applications meeting specific requirements. The slice should be capable
of dynamically adjusting resources to meet the application requirements. The network
infrastructure is expected to provide extreme flexibility to support those different capabilities with
reasonable cost.
Related work: ITU-T Y.3011, Y.3012, Y.3300, ETSI ISG NFV, Network Functions
Virtualization, 3GPP , IEEE SDN
Gap B.6.2.2-4: Support for emerging network architectures Priority: Medium
Description: There are both academic and commercial research activities for defining emerging
network architectures that do not assume the underlay network runs TCP/IP protocols. A
representative example of such network architectures is ICN (Information Centric Networking).
Although the current state of ICN could run on top of TCP/IP as an overlay, inherent benefits of
the architecture can be achieved if implemented natively, i.e., directly on top of the underlay, e.g.,
L1 or L2 networks. There exists a gap in supporting such emerging network architecture in the
current network technology, especially when it uses such an emerging network architecture in the
context of heterogeneous service delivery and function chaining. Network softwarization
provides slicing such that such multiple emerging network architectures could be realized within
individual slices.
- 20 -
TD 208 (PLEN/13)
Related work: ITU-T Y.3011, Y.3012, Y.3300, SG13 Q15
Gap B.6.6.2: Horizontal extension: End-to-end slicing Priority: High
Description: The scope of the current SDN technology primarily focuses on the portions of the
network such as data-centres, mobile and core networks. In IMT-2020 mobile networks, it is
necessary to consider end-to-end application quality and enablement through network
softwarization platform. Therefore, there exists a gap between the current projection of SDN and
NFV technology development and the requirements for end-to-end application quality. The
infrastructure for IMT-2020 mobile networks is desired to support end-to-end control and
management of slices and the composition of multiple slices, especially with consideration of
slicing over RATs and fixed parts of end-to-end paths. This gap has been analyzed against what is
defined in [ITU-T Y.3300].
Related work: ITU-T Y.3011, Y.3012, Y.3300, ETSI ISG NFV, Network Functions
Virtualization
Gap B.6.6.3: Vertical extension: Deep data plane programmability (data
plane enhancement)
Priority: High
Description: The current SDN technology primarily focuses on the programmability of the control
plane, and only recently the extension of programmability to the data plane is being discussed both
in the research community and in ITU-T SG13 but without well-defined use cases. For IMT-2020
mobile networking, there are several use cases for driving invention and introduction of new
protocols and architectures especially at the edge of the network. For instance, the need for
redundancy elimination and low latency access to contents in content distribution drives ICN at
mobile back haul networks.
Protocol agnostic forwarding methods such as Protocol Oblivious Forwarding (POF) discuss the
extension to SDN addressing forwarding with new protocols. In addition, protocols requiring a
large cache storage such as ICN needs new enhancement.
A few academic research projects such as P4 [b-P4] and FLARE [b-FLARE] discuss the possibility
of deeply programmable data planes that could implement new protocols such as ICN, but there is
no standardization activity to cover such new protocols to sufficient extent.
Therefore, there exists a gap between the current projection of SDN and NFV technology
development and the requirements for deep data plane programmability. The infrastructure for
IMT-2020 mobile networks is desired to support deeper data plane programmability for defining
new protocols and mechanisms. This gap has been analyzed against what is defined in [ITU-T
Y.3300].
Related work: ITU-T SG13 Y.3011, Y.3012, Y.3300
Gap B.6.6.4: Considerations for applicability of softwarization Priority: High
- 21 -
TD 208 (PLEN/13)
Desrciption: SDN and NFV are primarily motivated by OPEX and CAPEX reduction and flexible
and logically centralized control of network operations, and these technologies aim to focus on
softwarization of everything everywhere possible to meet various network management and service
objectives. Also the traffic classification is often per flow basis.
In IMT-2020 mobile networks, some applications have stringent performance requirements such
as ultra-low latency and high peak rate while others may not require cost-effective solutions.
Solutions exist ranging from application driven software-based solutions executed on a
virtualization platform with a hypervisor, container or bare metals, to complete hardware-assisted
solutions. The former may need performance enhancement enabled by hardware-assisted solutions,
while the latter may be facilitated by software-based solutions.
The infrastructure for IMT-2020 mobile network must support traffic classification performed not
only by flow-basis but also by other metrics and bundles such as per-device and per-application
basis so that software /hardware based solutions may be applied appropriately for individual use
cases. Therefore, there exists a gap between the current projection of SDN and NFV technology
development and the requirements for applicability of softwarization. This gap has been analyzed
against what is defined in [ITU-T Y.3300].
Related work: ITU-T Y.3011, Y.3012, Y.3300, ETSI ISG NFV, Network Functions
Virtualization
Gap B.6.6.5: End-to-end reference model for scalable operation Priority: Medium
Description: Intensive studies are required on both the dimension and the dynamic behaviour of
softwarized networks, since such highly virtualized systems will have an enormous number of
instances and reactions are not easy to extrapolate from current physical systems.
The virtualized resource handling must be the essential part of the scalable and novel operation
architecture, which potentially improves conventional network operations and, possibly even up to
the level of supporting disaster recovery, by using softwarized network resiliency and recovery of
/with the virtualized systems both in a single domain and in multiple domains.
One of the benefits of IMT-2020 systems should be the end-to-end QoE management, however,
this capability will be established on the complex interaction between the virtualized systems
including UEs, Cloud Systems, Applications, and the softwarized network systems. The
softwarized network system itself will be composed of various virtualized subsystems. An
appropriate end-to-end reference model and architecture should be intensively investigated for such
complex systems.
.
Related work: None
Gap B.6.6.6: Coordinated APIs Priority: Medium
- 22 -
TD 208 (PLEN/13)
Description: In IMT-2020 mobile networks, it may be useful to define APIs so that applications
and services can program network functions directly bypassing control and management to
optimize the performance, e.g., to achieve ultra-low latency applications. Information modelling
should be the most significant issues for the APIs development. It should include virtual resource
characteristics, relationship between various resources, operational models, and so on.
Discussions on the programmable interface capabilities should include:
- A level of abstraction sufficient both for system operations and for customization of the
capability provided by the interfaces
- Modelling for the virtual/abstracted resource in a multiple-technology environment
- Ease of programming for service and operation velocity
- Technologies for automatic and/or autonomic operations
- Provisioning of classified functional elements suitable for a range of system developers such
as supplication service providers, network service providers, and network management
operator
These issues should be considered as a gap to be discussed for possible standardization items.
Related work: None
Gap B.6.7: Energy management aspects of network softwarization Priority: High
Description: Energy-conscious IMT-2020 single domain: optimizing the energy consumption
within the limits of a single domain, based on system virtualization and the optimal distribution of
VMs as well as M2M scenario This will be coupled with the dynamic adaptation of active and
stand-by servers/network functions and the load optimization per active server. A new monitoring
framework to measure the energy consumption per server module/networking component and
activate low-power states on devices would be needed.
A Group of energy-conscious IMT-2020 domains: optimizing the cumulative energy consumption
in a group of domains, based on optimal distribution of VMs across all of the servers that belong
in the group of domains using policy-based methods. Measuring the energy consumption on the
domain level and deploying policies and solutions that will achieve decreased cumulative power
consumption across the whole group of domains would be needed.
Related work: None
Gap B.6.8: Economic incentives aspects of network softwarization Priority:
Description: Sufficient attention needs to be paid to economic and social aspects such as
economic incentives in designing and implementing the IMT-2020 network softwarization and its
architecture in order to provide a sustainable competition environment to the various participants.
Drastic reduction of the operational and lifecycle costs for all components and systems involved
in the IMT-2020 network softwarization would be recommended for efficient and sustainable
deployment enabling an appropriate return for all involved actors.
Ways of resolving economic conflicts including tussles in the IMT-2020 networking and
servicing ecosystem that include an economic reward for each participant’s contribution are
- 23 -
TD 208 (PLEN/13)
becoming essential. Different participants may pursue conflicting interests, which could lead to
conflict over the overall multi-domain operation of network softwarization and controversy in
international/domestic regulation issues.
Related work: Y.3013
Gap B.7: Network management and orchestration Priority: High
Description: There are two aspects to consider for the network management and orchestration for
the network softwarization. The first aspect is how to manage and orchestrate the softwarized
network components. The second is how to softwarize network management and orchestration
functionality. The current technology gaps to be filled in are provided.
Related work: ITU-T Y.SDN-ARCH, Y.AMC, ETSI ISG NFV, MANO, TMF ZOOM
Gap B.8.1: Support enhanced MEC management Priority: Medium
Description: Mobile edge computing (MEC) uses a virtualization platform for applications running
at the mobile network edge. Although mobile edge server lifecycle management is supported by
existing NFV management functionality, MEC management should support some enhancements
in following aspects:
1) Mobile edge application lifecycle management: The MEC management functionality
should support the instantiation and termination of an application on a Mobile edge server
within the Mobile edge system when required by the operator or in response to a request by
an authorised third-party.
2) Mobile edge application service management: The Mobile edge platform provides services
that can be consumed by authorised applications. Applications should be authenticated and
authorised to access the services. The services announce their availability when they are
ready to use, and mobile edge applications can discover the available services.
Related work: ETSI MEC ISG GS MEC 002 &GS MEC 003, ETSI NFV ISG IFA WG
Gap B.8.2: Support inter-edge mobility of a MEC system Priority: High
Description: Mobility is an essential component of mobile networks. Considering some mobile
edge applications are specifically related to the user activity, the MEC system needs to maintain
some application-specific user-related information that needs to be provided to the instance of that
application running on another Mobile edge server. Therefore a MEC system should support an
inter-edge mobility mechanism for service continuity when the user is moving to an area served by
another mobile edge platform that hosts the application.
Related work: 3GPP TS 23.401, TR 23.714, ETSI MEC ISG GS MEC 002&GS MEC 003
- 24 -
TD 208 (PLEN/13)
Gap B.8.3: Support more simple and controllable APIs of a MEC system Priority: Medium
Description: In order to enable the development of a strong ecosystem for mobile edge computing
(MEC), it is important to develop APIs that are as simple as possible and directly meeting the needs
of applications. In addition, standardized APIs may need some enhancement to provide radio
analytics or radio network information. Therefore, the MEC system should optimize existing APIs
to make them more simple and controllable.
Related work: ETSI ISG MEC GS MEC 003, 3GPP RAN
Gap B.8.4: Support traffic routing among multiple MEC applications Priority: High
Description: The mobile edge platform routes selected uplink and/or downlink user plane traffic
between the network and authorized applications, and between authorized applications. More than
one applications might be selected for the user plane traffic to route through properly (e.g. video
optimization and Augumented reality). The MEC system should support a traffic routing
mechanism among multiple applications: selection and routing during traffic redirection based on
re-direction rules which are defined by the operator per application flow, and selected authorized
applications can modify and shape user plane traffic.
Related work: 3GPP TR 23.718, TS 23.203, ETSI MEC ISG GS MEC 002, GS MEC 003
Gap B.9: Distributed cloud for service provider Priority: Medium
Description: The existing IMT network has its limitation and lacks of flexibility and agility for
deploying the network functions and applications at any location where the performance and user
experience would be optimized. In order to meet the extremely various demands of the services in
IMT-2020, for example, from ultra-low latency to high-latency tolerable service, distributed cloud
technology provides a viable solution. To realize its benefits, the following gaps would need to be
filled: (1) Distributed storage services that provide uniform, system-wide, distributed block storage
for the applications (e.g., OpenStack’s Swift and Cinder subsystems) (2) Networking services that
SDN enables such as cloud-wide, virtualized connectivity, both at L2 and L3 levels, such as
OpenStack’s Quantum, (3) Distributed compute services that manage VMs, doings tasks such as
start, stop, migration and supervisions of VMs is to be performed by a cloud computing service
(e.g., CloudStack and OpenStack’s Nova) and (4) Cloud management API for applications on top
of the cloud infrastructure (e.g., OpenStack) for application deployment, migration and portability.
Although it is ideal to have all applications running inside VM’s, reality, at least in the short term,
dictates that some tasks must continue to execute on non-virtualized or specialized hardware. In
order to limit the extra OPEX burden such system anomalies represent, it is still necessary to
provide these environments with an API that makes it possible to manage them the same way (i.e.
- 25 -
TD 208 (PLEN/13)
by abstracting and presenting a uniform interface to the applications) as is done with VMs, so that
it is still possible to keep parts of the management APIs (loading, start, stop etc.) uniform and
identical to the ones as in VMs.
Related work: ETSI ISG NFV, OpenStack, OpenDayLight, CloudStack
Gap B.10: In-network data processing Priority: Medium
Description: One use case scenario of in-network data processing is included in ITU-T SG13 that
deals with requirements and architecture with in-network data processing. However, only a limited
number of use case scenarios are described for network data processing. Further discussion for
viable in-network data processing for IMT-2020 mobile network is necessary.
Related work: SG13/Q15
Gap B.11: Resource usage optimization Priority: Medium
A large portion of digital data is transferred repeatedly across networks and duplicated in storage
systems, which costs excessive bandwidth, storage, energy, and operations. Thus, great effort has
been made in both areas of mobile and fixed networks and storage systems to mitigate the
redundancies. However, due to the lack of the coordination capabilities, expensive procedures of
C-H-I (Chunking, Hashing, and Indexing) are incurring recursively on the end-to-end path of data
processing. Redundancy reduction methodology in an end-to-end path of a softwarized network
may be needed for resource usage optimization.
Related work: IETF CDNI WG, IRTF/ICN-RG
Gap B.12: Resource abstraction Priority: Medium
Description: This is no common model that can provide abstraction of various capabilities
supported by physical resources that constitute end-to-end scope and are not covered by existing
networks, including, physical radio interfaces, packet forwarding and routing in access networks.
The granularity of the current abstraction model may not be sufficient to support various
approaches to satisfy end-to-end quality requirements of the application, while minimizing impact
on utilization of networks.
Related work: ITU-T Y.3300, ETSI ISG NFV
There exists the general guideline for resource abstraction described in [ITU-T Y.3300],
specifically, Common resource abstraction model and Granularity of abstraction.
Gap B.13: Migration towards newly emerging network Priority: Medium
- 26 -
TD 208 (PLEN/13)
Description: Network virtualization, described in [ITU-T Y.3011], allows the network providers to
integrate legacy support and keep backward compatibility by allocating existing networks to LINPs
(i.e., slices) for deploying new network technologies and services or migrating to new network
architecture.
It is expected that network softwarization, especially slices, can provide migration paths to newly
emerging network architectures since it may be possible to accommodate multiple network
architectures in slices concurrently. However, there is yet no activity observed for discussing the
detailed migration scenario.
Related work: ITU-T Y.3011
Gap B.14: RAN virtualization and slicing under software control Priority: High
Description: Virtualization of the RAN domain in conjunction with software control is expected to
be an effective solution to provide appropriate QoE for diversified service requirements in dynamic
way with a reasonable cost. RAN resources and functionalities are mapped onto the network slices
in association with service profiles.
Following elements should be defined.
(1)Slice management and the arrangement of VNFs, virtual topology and software based
transport control on the slice.
(2)Activation of slice attributes such as the application drive, resiliency, OAM, and security on
each slice and inter-slice.
(3)Appropriate APIs in some network elements such as UE, X-haul, TSDN, NVFs, OTN/DWDM.
Related work: ITU-T/SG13,SG15, 3GPP/SA2,SA5 (ITU-T Y.3300, ITU-T Y.3320, ITU-R REP
M.2320, 3GPP TR 22.891, 3GPP TS 28.500, 3GPP TR 32.842), in order to introduce the Slice
concept and software elements controlled around RAN in E2E including front haul/back haul
Gap B.15: Capability Exposure Priority: High
Description: An NGMN 5G White paper has proposed the requirements on network capability
exposure to enable business agility, and envisioned a IMT-2020 architecture that includes network
capability exposure as a key functionality.
4G network architecture enhancement for capability exposure is an ongoing study in 3GPP SA2.
IMT-2020 capability exposure work is on the stage of service requirement research in 3GPP SA1.
It mentions that the network slicing capability in the IMT-2020 era could be exposed to the
customer by providing to it the specific network slice according to its demand. However, the
detailed discussion on capability exposure is not yet done and current use cases are not
comprehensive and systematic. The existing ITU-T specifications have covered some aspects in
NGN context [ITU-T Y.2234 and ITU-T Y.2240 from a capability perspective],
The following points should be studied:
• Scenarios and requirements of network capability exposure
• Architecture, mechanism and API of capability exposure
– Overall architecture for the capability exposure
– Potential solutions and the E2E procedure to enable each capability to
fulfill the specific service demand
– Open APIs interworking with third parties based on the investigation on
API work of this document.
- 27 -
TD 208 (PLEN/13)
– Privacy and Security
Related work: NGMN 5G White paper has proposed the requirements on network capability
exposure.
4G network architecture enhancement for capability exposure is an ongoing study in 3GPP SA2.
3GPP SA1, ITU-T Y.2234 and Y.2240 from a capability perspective.
7.2.2 Recommendations to parent group on network softwarization
(1) Each identified gap needs careful discussion and consideration as to which SDO should pick up
the work and whether standardization immediately required or if further discussion towards
standardization is needed.
(2) If each identified gap is to be standardized, it needs coordination among related SDOs such as
ETSI ISG NFV, ETSI ISG MEC, 3GPP, and ONF.
(3) It is recommended that the network softwarization study should be co-developed further in
accordance with other study issues from the following perspectives:
ICN group: deep data plane programmability for implementation and slicing for accommodation
front haul/back haul group: RAN virtualization
High-level Architecture group: overall design of architecture
E2E QoS group: End-to-end application quality
7.3 End-to-end QoS
7.3.1 Standardization gaps on end-to-end QoS
The gaps included in this clause were extracted from the output of the end-to-end QoS gap analysis
work included in Appendix III. Note, the gap reference refers to the respective clause(s) in
Appendix III.
Gap C.7.3-1. Definition of end-to-end Priority: High
Description: 3GPP’s concept of “end-to-end” comprehensively covers the whole network from a
user’s device to another user’s device. However, its UMTS bearer concept is limited to an interval
starting from user’s device to PDN gateway (a gateway in wireless core network) for the sake of
practicality (i.e., a network operator can influence only its network and its radio interface). (3GPP
TS 23.107, TS 23.401 Rel.12)
- 28 -
TD 208 (PLEN/13)
ITU-T, on the other hand, attempts to identify network QoS from end-user to end-user by defining
UNI to UNI objectives in Y.1541. However, the concept is usually applied to wireline IP-based
services without any specific discretion on technologies of lower layers.
IMT-2020 QoS standard should define a common single end-to-end definition.
Related work: ITU-T Y.1540, Y.1541, Y.1542, 3GPP TS23.107, TS23.401
Gap C.7.3-2. End-to-end connectivity for D2D/D2N – integrity and
supervision Priority: High
Description: Existing standards for mobile (e.g. 3GPP) and fixed (e.g., ITU-T) networks have
been developed for human-to-human and human-to-machine connectivity which is concatenated
through the device, access network, core network and server and vice versa. IMT-2020 QoS
standard should study device-to-device and device-to-(edge) network connectivity cases, which
are generally shorter than conventional connectivity
Related work: ITU-T I.350, I.356, Y.1540, Y.1561, Y.1563
Gap C.7.3-3. Different QoS classification among mobile and fixed networks Priority: Medium
Description: While mobile network-related standards (e.g. 3GPP) specify 13 QoS Classification
Indicators (QCI), fixed network-related standards (e.g., ITU-T) introduce 6 QoS classes with
different parameters and performance objectives. IMT-2020 QoS standards should study the way
to be applicable for both networks.
Related work: ITU-T I.356, Y.1541, 3GPP TS 23.107
Gap C.7.3-4. Additional QoS parameters Priority: High
Description: Latency is just one of parameters to define QoS aspects. An IMT-2020 QoS standard
should study other parameters, such loss ratio, delay variation (jitter), etc. for the delivery
performance viewpoint,.New parameters should be considered to support IMT-2020 specific use
cases for service execution capability such as remote surgical operation, autonomous driving and
virtual reality. Also, the impact of new network architectural aspects should be taken into account;
network softwarization (e.g. slicing), ICN etc.
Related work: ITU-T I.350, I.356, Y.1540, G.1010, 3GPP TS23.107
Gap C.7.3-5. Measurement and monitoring Priority: Medium
Description: For Device-to-Device and Device-to-Network connectivity cases with very low delay
(e.g. 1ms) require definition of the methodology of measurement, reference points and monitoring
methodology. An approach using OAM technology for intrusive measurements should be also
taken into account for this purpose. While Gap C.7.3-2 focuses on the definition itself, this gap is
related to how to manage and operate Gap C.7.3-2.
- 29 -
TD 208 (PLEN/13)
Related work: ITU-T I.356, O-series, Y.1541
Gap C.7.3-6 QoS budget allocation for mobile and fixed networks Priority: Medium
Description: Performance objectives in existing standards (ITU-T & 3GPP) were developed
focusing on its own network’s connectivity (i.e. mobile or fixed). End-to-end performance
objectives covering mobile and fixed networks should be allocated into media-dependent way
such as fiber optics and radio etc.
Device-to-network communication is different from conventional human-to-human
communication in aspects such as frequency of communication (periodic) and type of traffic
generated (usually more signalling traffic than data). Device-to-device communication also is
distinctly different from the conventional communication because the distance will be much
shorter and the configuration will be simpler (with smaller number of nodes). In-depth study is
necessary to develop QoS budget allocation for these connectivity configurations.
Related work: ITU-T Y.1541, 3GPP TS23.107, TS23.401
Gap C.7.3-7. Performance objectives Priority: High
Description: The conversational voice application has been considered to have the most stringent
performance objectives; end-to-end one way latency of 150ms for human’s mouth-to-ear
connectivity and 100ms for UNI-to-UNI.
Assuming that the revised end-to-end connectivity for device-to-device and device-to-network
impose stringent performance objectives, new QoS performance objectives may be required.
Related work: ITU-T G.1010, ITU-T Y.1541
Gap C.7.3-8. Layered approach Priority: Low
Description: Realizing QoS requirements must be based on the structure of technologies and
protocols in different layers, ITU-T’s Y.1540 standard provides a layered model of performance
of IP service to illustrate the point aforementioned. The lower layers do not have end-to-end
significance (i.e., it transfers packet from one point to another) but the type of technology
employed (e.g., Ethernet-based leased lines) may affect the performance.
3GPP’s bearer acknowledges the effect of various layers on IP services, but defines the bearer on
layer 1 and 2 for the use of higher layers (3GPP TS 23.107 & 23.401). Nevertheless, both 3GPP
and ITU-T acknowledge that the frame work must take into account the impact from performance
of layer 1 and 2 in both wireline and wireless media.
Higher layers implemented in service execution systems (security, mobility, interworking etc) may
also affect performance.
The IMT-2020 QoS standard development should study the overall layered structure and inter-
relationship.
Related work: ITU-T Y.1540, 3GPP TS 23.107, TS 23.401
- 30 -
TD 208 (PLEN/13)
Gap C.7.3-9. Overall QoS study applicable to IMT-2020 Priority: High
Description: Since new technologies are required to implement the IMT-2020 network, the
operational aspects at the QoS level in the real field, and an understanding of QoS end-to-end
require the initiation of study of these new concepts (for example, network softwarization
(e.g.slicing) and other areas (including, for example network management/OAM, signalling,
network architecture, implementation scenarios, etc.)
Moreover, the hybrid mobile and fixed network environment of IMT-2020 calls for a systematic
and integrated approach to establish a common framework for QoS standards.
Related work: SG2, SG11, SG12, SG13, SG20 – related recommendations
7.3.2 Recommendations to parent group on End-to-end QoS
Gaps from C.7.3-1 to C.7.3-8 could be delivered to Study Group 12 for further in-depth
standardization. However, for the purpose of operation and management, development of the
overall QoS end-to-end standards from the network point of view should be kept inside Study
Group 13.
7.4 Mobile front haul and back haul
7.4.1 Standardization gaps on Mobile front haul and back haul
The gaps included in this clause were extracted from the output of the mobile front haul and back
haul gap analysis work included in Appendix IV. Note, the gap reference refers to the respective
clause(s) in Appendix IV.
Gap D.7.1-1. Large capacity transmission Priority: Low
Description: There is requirement for large capacity transmission to support ultra high speed
mobile transport. Data compression for radio interfaces could be a candidate.
Related work: CPRI, OBSAI and others have specified 9830.4Mbit/sec for 20MHz, 2x2MIMO x
4ch .and are considering to producing a future specification of 12Gbit/sec. It is recommended that
they continue this work toward further enhancement of the specification.
Gap D.7.3-1. Timing requirements Priority: Medium
Description: More precise definition and specification of timing requirements is needed,
including a breakdown of the impairment budget over the envisioned networks, both for front
haul and back haul.
- 31 -
TD 208 (PLEN/13)
Gap D.7.3-2. Low latency Priority: High
Description: Specification of E2E delay of the routing path, processing time and the time in the
queues are needed. Related studies, such as, routing of end-to-end communication, processing on
the BS instead of the processing on the servers, and minimizing the time in the queues are also
expected.
Related work: For routing of E2E communication, and for minimizing the time in the queue in
PON systems, VLAN and DBA protocols are specified in G.987.1 or G.989.1. There are no
specifications about interworking with RAN or protocols for non-PON systems.
Gap D.7.4. Power saving by sleep or rate control Priority: Medium
Description: For the power saving, sleep control or transmission rate control is expected for the
both of radio-over-fibre(RoF)/ Non-radio-over-fibre mobile traffic transmission. Especially, when
RoF is used in the front haul, signal is on all the time, even if the data traffic is zero in the ODN.
Related work: SG15 has delivered G.suppl 45 (mobile use isn't expected) including the power
saving for PONs. However sleep or rate control does not seem to be studied which are obtained
by the information from other functions.
Gap D.7.5-1. PON as the virtual digital wireline service Priority: High
Description: A protocol is needed for CPRI over Ethernet and/or redefinition of function
splitting.
A study of different function splitting points is needed to optimize the front haul wireless
network.
Related work:
Discussion has been started in academia, and also in the IEEE NGFI project, but it has not been
standardized yet. Collaboration is expected between wireless and fixed network SDOs.
Gap D.7.5-2. Large number of fibers for front haul Priority: High
Description: The front haul with large number of small cells requires a large number of fibers.
The PON/ODN/WDM can reduce the number of fibers and interfaces in the base station in the
FH.
Related work: SG15 has delivered G.989.1 which is considering the PON/ODN/WDM systems
for BH. Q2/15 is now studying PON/ODN for front haul with RoF. However the use case for
front haul with non-RoF or CPRI does not seems to be considered. Q6/15 is now studying
G.metro, with looks at similar issues in a metro transport network context.
Gap D.7.6. Reliability and resiliency Priority: Medium
Related work: Q13/15 is active on these topics, having produced G.827x G.826x series, but not
enough for IMT-2020 timing requirements. It is recommended they continue this work.
- 32 -
TD 208 (PLEN/13)
Description: Automatic resource reallocation mechanisms and interfaces to negotiate the
allocation between the mobile systems, network controller and FH transport systems are
expected. Resource reallocation for softwarized front haul system is also expected.
Related work: For PON systems, switching time for wavelengths is specified in G.989.2, and
duplex architecture is specified in G.983.1. There are no specifications about automatic resource
reallocation mechanisms and interfaces to negotiate the allocation. For optical transport networks
(OTN), protection is described in G.873.1 and G.873.2. For packet transport, protection is
considered in G.8031 and G.8032. All of these could be leveraged.
Gap D.7.7-1. Diversified types of terminals Priority: High
Description: Interfaces, required for various terminals and various devices to negotiate with the
gateway of IoT devices, service servers or network controllers, are expected.
Related work: For providing of virtualized networks to the various types of terminals or services,
VLAN and DBA protocols are specified in G.987.1 or G.989.1. There are no specifications about
interworking with the RAN.
Gap D.7.7-2. Diversified types of traffic Priority: High
Description: Interfaces between the mobile systems and front haul/back haul systems are
expected in order to monitor the traffic type, the required service policies and the network
controller.
Related work: For providing of virtualized network to isolate traffic based on service, priority or
some other policies, VLAN and DBA protocols are specified in G.987.1 or G.989.1. There are no
specifications about interworking with RAN.
Gap D.7.7-3. Diversified types of network operator Priority: High
Description: Interfaces between mobile systems (or network controllers) and front haul/back haul
systems need to allow the operator access to part of the management system.
Related work: For providing of virtualized network to isolate traffic by the operator, VLAN and
DBA protocols are specified in G.987.1 or G.989.1.
Gap D.7.7-4. Diversified types of RAN Priority: High
Description: Interfaces between mobile systems (or network controllers) and front haul/back haul
systems need to allow access to part of the management system for management of multiple,
different RANs.
Related work: For providing of virtualized network with 3G/4G/IMT-2020/WiFi heterogeneous
seamless integrated operation, VLAN and DBA protocols are specified in G.987.1 or G.989.1.
Gap D.8.1-1. Optimization of module or chip device design
Priority:
Medium
- 33 -
TD 208 (PLEN/13)
Description: For cost reduction of high-speed CPRI (40G/100G) interface, adoption of
commodity modules or devices like Ethernet-PHY’s is expected. Therefore the standard of
functionality or interfaces for CPRI over Ethernet -PHY is needed.
Related work: IEEE1904.3 is starting to discuss on the topic of Radio over Ethernet but has not
been standardized yet”.
Gap D.8.1-2. PON with WDM overlay Priority: Low
Description: WDM multiplexing over fiber access systems may be useful for front haul, and these
systems need to be described in terms of their system architecture, link parameters, and
management features.
Related work: Q2/SG15 has the G.989 series, that describes a WDM overlay PON system in
detail. Q6/15 has the G.metro project, that describes a similar system for the metro transport
space.
Gap D.8.2. Analog radio over optical fiber transmission Priority: Low
Description: Analog radio-over-fibre (RoF) system requirements, transceiver specifications, and
transmission convergence schemes need development, with the goal of producing interoperable
analog transport.
Related work: Q2/SG15 has produced G.sup.55 that describes RoF generically, and has started a
project to develop a G.RoF recommendation series. WDM transport systems have been
described in Q2/15 and Q6/15.
Gap D.8.3. CPRI over OTN Priority: Medium
Description: The transport of CPRI or CPRI-like signals over OTN has demanding requirements,
mainly regarding symmetry and the transport of timing for these client signals.
Related work: Q11/15 has produced G.sup.56 that describes the transport of CPRI over OTN.
More work to resolve the timing issues is needed.
Gap D.8.4. Improved CPRI Priority: Medium
Description: The existing CPRI format is restrictively simple, and the interface is exacting in its
specifications. New formats that solve these problems would be a useful addition.
Related work: Q2/15 has defined a transcoding method in G.989.3 to reduce the 20% overhead
of 8b10b code. More work by the groups that defined CPRI is needed.
Gap D.8.5. Radio over packet Priority: Medium
Description: The transmission of radio data over packet networks needs to be studied to
determine if it is feasible, and if so, to describe the system as a whole, the network node
behaviours and the end-point adaptation functions.
Related work: IEEE 802.1CM will develop a profile for front haul over Ethernet bridges; IEEE
TSN is working on some solutions for precision timing and low-delay packet forwarding over
- 34 -
TD 208 (PLEN/13)
Ethernet bridge. IEEE1904.3 is starting to discuss on the topic of radio over Ethernet. Also, the
IEEE Comsoc NGFI group is starting work on this and other areas.
Gap D.8.6. Developing function splitting of front haul network Priority: High
Description: A study of different function splitting points is needed to optimize the front haul
wireless network. The key trade-off is the centralization of processing / wireless performance vs.
transport bandwidth requirement.
Related work: Discussion has been started in academia, and also in the IEEE NGFI project,but it
has not been standardized yet”.
Collaboration is expected between wireless and fixed network SDOs.
Gap D.8.7. Extension of G.metro for the transport of CPRI in MFH/MBH
networks
Priority: High
Description: The transport of CPRI or CPRI-like signals in metro networks is currently discussed in
Q6/15 where a new draft Recommendation G.metro is being developed. G.metro is a WDM based
transport network, where low cost wide tuneable lasers are indispensable in the development of such
a recommendation. Photonic integration could also be beneficial. G.metro could be extended to
transport CPRI over the MFH/MBH networks
Related work: Q6/15 has been working on G.metro since March/April 2014, and is targetted for
consent in Sep 2016.
Gap D.9.2.1. Coordination of power saving across MFH/MBH/Radio System Priority:
Medium
Description: For power saving, interworking is expected between the FH, BH and radio systems.
Generally flow routes or radio systems (IMT-2020, WiFi, or stations) to the UE are selectable.
Related work: SG15 has delivered G.9802 with section 9.3 "wavelength resource administration",
however interoperability is not addressed.
Gap.D.9.2.2. Power saving by resource optimization Priority: Medium
Description: For the power saving, resource optimization is expected such as the optimization of
the number of activated OSUs in TWDM PON, the number of allocated optical paths or
allocation of wireless resource.
Related work: SG15 has delivered G.989.1 with section 9.6 “power reduction” for NG PON2.
However schemes and interfaces for the FH, BH and radio system do not seem to be studied for
the optimal resource allocation.
7.4.2 Recommendations to parent group on Mobile front haul and back haul
As the result of gap analysis and a survey of the related technologies and standards, 22 standards
gaps were identified for front haul/back haul for IMT-2020. These gaps can be categorized into
mainly three groups
- 35 -
TD 208 (PLEN/13)
(1) The gaps depending on the transport technologies which are better to be discussed by the
specialists for the transport layer like the SG15:
D.7.3-1, D.7.3-2, D.7.5-2, D.7.6, D.8.1-2, D.8.2, D.8.3, D.8.7.
(2) The gaps related to the network architecture, interworking technologies between the front
haul/back haul/Core/Radio-Systems and network softwarization technologies which should be
discussed by the collaborations of the transport and architecture groups:
D.7.7-1, D.7.7-2, D.7.7-3, D.7.7-4, D.9.3
(3) The gaps other than previous 2 categories which should be studied in collaboration with several
groups such as ITU-R, 3GPP and IEEE:
D.7.1-1, D.7.4, D.7.5-1, D.7.7-4, D.8.1-1, D.8.4, D.8.5, D.8.6, D.9.3, D.9.4
7.5 Emerging Network Technologies
7.5.1 Standardization gaps on Emerging Network Technologies
The gaps included in this clause were extracted were extracted from the output of the Emerging
Network Technologies gap analysis work included in Appendix V.
Gap E.1 Considering ICN as a protocol for IMT-2020 Network Priority: High
Description: In the existing mobile infrastructure, IP is the main transport protocol and everything
is optimized around the layer-3 OSI (TCP/IP) stack. However, experience has shown that there is
a need to migrate to protocols which can comprehensively integrate infrastructure, transport, and
content. Research and development in ICN shows the possibilities to solve this problem. ICN will
need further development in areas such as mobility management, end-to-end QoS, prioritization
and scale to manage billions of devices, which are framework of IMT-2020 networks.
There are three possible scenarios for IMT-2020 network where ICN can be introduced
Option 1: The IMT-2020 network using ICN as an overlay protocol
Option 2: The IMT-2020 Network using IP as transport for mobility management and ICN for
service delivery without an overlay. ICN routing exists on the UE and P-GW.
Option 3: The IMT-2020 network using ICN as native transport for mobility management and
service delivery. ICN routing exists throughout the network.
Gap: Detailed architecture analysis of the three above options is required.
Related work: IRTF/ICNRG documents
Gap E.2 ICN – Robust header compression for air interface (PDCP) Priority: High
Description: Applicable to Options 1, 2 and 3: Standard compression techniques, such as LZW,
are not appropriate for ICN packets because many of the fields represent cryptographic octet
strings and thus are not sub-string compressible.
Gap:
- 36 -
TD 208 (PLEN/13)
1. When encapsulated in IP, there is a need to specify an ICN profile, similar to an RTP
profile.
2. When used as a native protocol, e.g. over an ICN slice, there is a need to specify an ICN--
specific ROHC profile at the air interface.
Related work: IETF RFC 4995, 3GPP TS 36.300
Gap E.3 ICN – Mobility anchoring (ICN aware S-GW) Priority: Medium
Description: Applicable to Option 3:
Existing mobile networks have one mobility anchoring point (S-GW) so that devices can be
located for downstream traffic. Each UE has one anchoring point and multiple service end points
e.g. APN based upon simultaneous services being accessed by the application running device e.g.
visual voice mail, VoLTE, mobile internet etc. For the IMT-2020 architecture, using ICN as a
transport protocol, a change in the ICN specification is needed to support edge device anchoring.
ICN allows for new mobility models not tied to the anchor-based approach used for IP. This is
because ICN does not require a unique source representation (egress identity).
It is necessary to modify and develop call flows for ICN based device attachment, authentication
and registration with content providers.
It is proposed to describe an ICN operating in three different models:
1. Similar to current single anchor like S-GW and P-GW
2. Using the closest ICN router(s) as a single attach
3. Distributed among points of attachment
Gap: The 3GPP model and the ITU-R 5G document specify that a UE only has one S-GW,
whereas for ICN, multiple simultaneous gateways would be required.
Related work: ITU-R M.[IMT.ARCH], 3GPP TS23.401
Gap E.4 ICN – Mobility (ICN-aware MME) Priority: Medium
Description: Applicable to Option 3:
In the existing LTE architecture, all mobility management is handled by the MME, eNodeB, etc.
The ICN protocol must evolve to include mobility management messages. Mobility management
can be done either by the MME or something similar e.g. ICN router(s)/edge gateway. The first
step for introduction of ICN capabilities can be an ICN aware MME, S-GW/P-GW, etc. and
eventually replacing the GTP based model with ICN based transport functions e.g. an ICN-aware
MME should allow for one of the several ICN-style mobility models.
Gaps: The 3GPP TS23.401 specification specifies mobility management and attachment
procedures using IP. New specifications and procedures are necessary to use ICN as a transport
protocol.
Related work: ITU-R M.[IMT.ARCH], 3GPP TS23.401
- 37 -
TD 208 (PLEN/13)
Gap E.5 ICN Protocol (ICN-aware P-GW operation) Priority: Medium
Description: Applicable to Options 2 and 3:
Description: Currently IP is used for UE attachment procedures for APN in the P-GW, which is
the services attachment point. The P-GW manages IP address allocation, billing and policy
enforcement etc. Gap: ICN mechanisms for P-GW functions such as billing, policy enforcement,
etc. need to be specified.
Related work: ITU-R M.[IMT.ARCH], 3GPP TS23.401
Gap E.6 ICN Protocol Execution (slice) Priority: High
Description: Applicable to Options 2 and 3: In the existing LTE architecture the main protocol is
based on IP however for IMT-2020 there is a need to define how ICN protocols operate in the
RAN and EPC. What computing, execution or hardware resources will be available?
In the case of using a slice, there is a need to specifically enumerate the service interfaces and how
those interfaces are exposed to non-IP based protocols operating within a slice environment.
Gap: For a software-based slice environment, the ICN execution environment needs to be
described, including the virtualized resources that are available and their interfaces?
Related work: Network Softwareization
Gap E.7 ICN – Lawful intercept (specify what to capture) Priority: High
Description: Applicable to Options 2 and 3: In the existing LTE network, lawful intercept
messages are based on IP and these messages are taken from gateways (SAEGW, MME, HSS
etc.). ICN protocols may operate with a different model of SGW and PGW, such as those elements
being collapsed to the base station (option 3). This may significantly affect how lawful intercept
operates.
As a non-IP protocol, additional collection practices may need to be specified and implemented
for a specific ICN. When gateways are distributed, lawful intercept message have to be collected
from multiple egress points.
Gap: How to specify an intercept of a non-IP protocol, for example what does the packet filter
look like?
Related work:3GPP TS23.002
Gap E.8 ICN mobility and routing Priority: Medium
- 38 -
TD 208 (PLEN/13)
Description: Applicable to Options 2 and 3: There is a need to specify routing models for ICN
within an IMT-2020 environment to enable desired “mobility” features. During initial ICN
development work, mobility was not factored. However, the IMT-2020 network will have
mobility and this has to be managed for millions of devices.
There are three possible scenarios for mobility
UE consumer mobility
UE producer mobility
ICN state transfer
Operator maintained content is cached for intra-RAT and inter-RAT data retrieval. For example,
content with the same name may exist in multiple locations, but one does not want to create multi-
homed routes.
Distributed routing within the RAN
Certain features, such as MEC, could benefit from local dynamic routing to solve the service
rendezvous problem such that a UE application can easily exploit local services.
Disaster recovery or other edge applications could benefit from local dynamic routing.
Similar for IoT and M2M applications.
Gap: Study using the ICN routing and control for mobility management rather than the current
anchoring based mechanisms.
Related work:3GPP TS23.401
Gap E.9 ICN UE provisioning Priority: High
Description: Applicable to Options 2 and 3: ICN is a new technology that does not have the
breadth of support that IP has for operations and management.
In the current mobile network, the UE identity (IP address) is allocated and managed by the P-GW
based upon applications (APN). When ICN is used within the carrier network, then the carrier
should be able to assign a name and other ICN parameters.
Gap: Define a protocol and mechanism for ICN provisioning.
Related work: 3GPP TS23.401
Gap E.10 ICN managing IMT-2020 Self Organizing Network (SON) Priority: Medium
Description: Applicable to Option 3: SON needs to communicate between different radio, element
management system (EMS), OSS/BSS and core network (CN). ICN doesn’t support
communication mechanisms for SON.
- 39 -
TD 208 (PLEN/13)
Gap: There is need to define the right set of ICN messages and parameters so that the SON
platform is managed effectively.
Related work: 3GPP TS32.50X
Gap E.11 ICN – Operations and management (common interfaces) Priority: Medium
Description: Applicable to Options 2 and 3: Current management platforms are defined to run
over IP and manage IP. When ICN elements are introduced into the network the management
protocol needs to support ICN. In Option 3, management protocols may need to operate over ICN.
Gap: The IMT-2020 architecture describes common management interfaces that would need to be
ICN aware.
Related work: TMN documents
Gap E.12 ICN – Operations and management (SDN/Openflow) Priority: Medium
Description: Applicable to Options 2 and 3: Many of today’s carrier networks are
managed/programmed with SDN.
Gap: Today’s SDN tools need extensions for ICN.
Related work: Openflow, ONOS, ODL, POF, P4
Gap E.13 ICN – Security (authentication and encryption) Priority: Medium
Description: Applicable to Options 2 and 3: Often each party in an ICN communication is
considered to have a cryptographic identity. Should that identity be used in IMT-2020
associations or resource usage, or should it all be based on IMEI or existing IMT-2020 identity?
Key resolution services: some ICN approaches use the idea of a ‘key resolution service’ to
determine from a trusted anchor what public key a publisher should be using for its namespace. Is
this needed in an IMT-2020 environment and if so how would this integrate in a carrier
environment?
Gap: IMT-2000/Advanced has defined several identities for a UE. IMT-2020 is also required to
support several identities for a UE. A study is needed to determine if any of these identities are
suitable for ICN, or if additional cryptographic identities are needed.
Related work: 3GPP TS36.323, 3GPP TS33.401, 3GPP TS23.401
Gap E.14 ICN – Security (encryption) Priority: Medium
- 40 -
TD 208 (PLEN/13)
Description: Applicable to Options 2 and 3: Today, end-to-end encryption using IPSEC/TLS does
not allow the carrier to intelligently manage the data (e.g. DPI, caching). ICN offers new
possibilities for key exchange and encryption where the carrier can play an active role because the
ICN packet can be selectively encrypted between the carrier and the remote party.
Gap: ICN sometimes uses different forms of encryption than what is found in today’s IP networks.
IMT-2020 should study the use of selective ICN encryption.
Related work: None
Gap E.15 ICN – QoS (demand based) Priority: Medium
Description: Applicable to Options 2 and 3: QoS is well defined in IP and Ethernet layer which is
mapped to QoS Class Indicator (QCI). In Options 2 and 3, ICN can use a similar
mapping of DSCP to support interoperability with existing transport networks.
Additionally ICN provides the possibility for new forms of QoS definition.
Gap: A study is needed on ICN-specific QoS in IMT-2020, for traffic prioritization and congestion
management
Related work: 3GPP TS23.401
7.5.2 Recommendations to parent group on Emerging Network Technologies
The emerging network technologies group within FG-IMT-2020 has studied, in particular, the
applicability of ICN to solve the IMT-2020 challenges. In Gap E.1 we have described three
deployment options: (1) over-the-top, (2) continue using IP as transport for mobility management
and ICN for service delivery without overlay, and (3) using ICN as native transport for mobility
management and service delivery. Option (1) realizes no inherent benefits for IMT-2020 as it is
purely over-the-top. Option (2) allows incremental introduction of ICN to carrier networks, and we
view this as the most likely near-term use of ICN within IMT-2020. Option (3) requires further
development of ICN and IMT-2020 standards to use ICN natively in place of IP transport.
ICN may offer technological benefits for realizing IMT-2020 goals. We recommend that the Study
Group continue investigation of ICN and promote more in depth study of ICN inside IMT-2020
networks, particularly as a new service delivery platform that can unify the many different
requirements of IoT, edge computing and content delivery.
Option (2) makes the use of ICN visible to the IMT-2020 network so it is not simply a bit-pipe for
this new technology, but a participant. The use of ICN to replace IP as the transport protocol within
IMT-2020 is still a stretch goal within the 2020 timeframe. While it is an interesting research area,
we believe the current effort should go towards option (2).
Additional references related to ICN can be found in [b-ITU-T Y.3033] and [b-Y.supFNDAN];
8 Conclusion and future work
- Considering that the mandate (gap analysis) is successfully completed, the focus group
should not continue in its current form;
- 41 -
TD 208 (PLEN/13)
- The focus group has identified a set of gaps that need to be addressed. An indication
has been given where it should be done;
- Some aspects have not been addressed sufficiently due to time constraints, e.g., security
and privacy;
- The major differences between 4G and 5G have been identified and considered during
the preparation of the individual gaps.
- Some gaps do appear to be useful to continue moving forward with, considering the
gaps, and in coordination with other SDOs:
Demonstrations or prototyping with other groups (e.g., with open source
community);
Network softwarization and ICN;
Network architecture refinement;
Fixed mobile convergence;
Network slicing for front haul/back haul;
New traffic models and associated QoS and OAM aspects applicable to IMT-2020
architecture.
- 42 -
TD 208 (PLEN/13)
Bibliography
[b-ITU-T Y.3001] Recommendation (2012) - Future networks: Objectives and design goals -
http://www.itu.int/rec/T-REC-Y.3001-201105-I;
[b-ITU-T Y.3021] Recommendation (2012) - Framework of Energy Saving in Future Networks -
http://www.itu.int/rec/T-REC-Y.3021-201201-I/en;
[b-ITU-T Y.3031] Recommendation (2012) - Identification framework in future networks-
http://www.itu.int/rec/T-REC-Y.3031-201205-I;
[b-ITU-T Y.3011] Recommendation ITU-T Y.3011 (2012), Framework of network virtualization
for future networks www.itu.int/rec/T-REC-Y.3011-201201-I/en;
[b-ITU-T Y.3012] Recommendation ITU-T Y.3012 (2014), Requirements of network
virtualization for future networks https://www.itu.int/rec/T-REC-Y.3012/en;
[b-ITU-T Y.3300] Recommendation (2014) - Framework of software-defined networking -
https://www.itu.int/rec/T-REC-Y.3300-201406-I
[b-ITU-T Y.3033] Recommendation (2014) - Framework of data aware networking for future
networks.
[b-Y.supFNDAN] Revised Draft of Y.supFNDAN – supplement to Y.3033 on scenarios and use
cases of data aware networking (July 13-25, 2015, Geneva).
[b-ITU-T Y.3500] Recommendation (2014) |– Cloud computing – Overview and vocabulary-
http://www.itu.int/rec/T-REC-Y.3500-201408-I
[b-ITU-T Y.3021] Recommendation (2013) - Cloud computing infrastructure requirements -
ww.itu.int/ITU-T/recommendations/rec.aspx?rec=11918
[b-ITU-T Y.3502] Recommendation (2014) - Cloud computing - Reference architecture
www.itu.int/ITU-T/recommendations/rec.aspx?rec=12209
[b-ITU-T Y.3511] Recommendation (2014) - Framework of inter-cloud computing -
https://www.itu.int/rec/T-REC-Y.3511/en
[b-ITU-T Y.3512] Recommendation (2014) - Cloud computing - Functional requirements of
Network as a Service- http://www.itu.int/rec/T-REC-Y.3512-201408-P
[b-ITU-T Y.3513] Recommendation (2014) - Cloud computing - Functional requirements of
Infrastructure as a Service - http://www.itu.int/rec/T-REC-Y.3513-201408-I
[b-ITU-T Y.1540] Recommendation (2011) - Internet protocol data communication service - IP
packet transfer and availability performance parameter - http://www.itu.int/rec/T-REC-
Y.1540-201103-I/en;
[b-ITU-T Y.1541] Recommendation (2011) - Network performance objectives for IP-based services
- http://www.itu.int/rec/T-REC-Y.1541-201112-I/en;
[b-ITU-T Y.1542] Recommendation (2010) - Framework for achieving end-to-end IP performance
objectives - http://www.itu.int/rec/T-REC-Y.1542-201006-I/en;
[b-ITU-T G.1000] Recommendation (2001) - Communications Quality of Service: A framework
and definitions - http://www.itu.int/rec/T-REC-G.1000-200111-I/en
[b-ITU-T G.1010] Recommendation (2001) - End-user multimedia QoS categories -
http://www.itu.int/rec/T-REC-G.1010-200111-I/en;
[b-ITU-R M.2083-0] Recommendation ITU-R M.2083-0 (2015), Framework and overall objectives
of the future development of IMT for 2020 and beyond.
https://www.itu.int/rec/R-REC-M.2083
- 43 -
TD 208 (PLEN/13)
[b-ITU-R M.2375-0] Reports ITU-R M.2375-0, Architecture and topology of IMT networks
https://www.itu.int/pub/R-REP-M.2375-2015
[b-ETSI MEC] Draft ETSI GS MEC 002, Mobile-Edge Computing(MEC);Technical Requirements
v.0.4.2 (2015-07-30)
[b-ETSI MEC] Draft ETSI GS MEC 003, Mobile Edge Computing(MEC);Framework and
reference architecture v0.0.1 (2015-06-05)
[b-3GPP TS 23.107] Technical Specification (2014) - Quality of Service (QoS) concept and
architecture - http://www.3gpp.org/ftp/specs/archive/23_series/23.107/
[b-3GPP TS 23.401] Technical Specification (2015) - General Packet Radio Service (GPRS)
enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
access - http://www.3gpp.org/ftp/specs/archive/23_series/23.401/
[b-ETSI NFV] ETSI NFV ISG, Network Functions Virtualisation,
http://portal.etsi.org/portal/server.pt/community/NFV
[b-IETF RFC 3746] IETF RFC 3746 (2004), Forwarding and Control Element Separation (ForCES)
Framework.
[b-IETF RFC 7149] IETF RFC 7149 (2014), Software-Defined Networking: A Perspective from
within a Service Provider Environment.
[b-IETF SFC] IETF Service Function Chaining (sfc) working group,
http://datatracker.ietf.org/wg/sfc/charter/
[b-ONF] Open Networking Foundation, "OpenFlow/Software-Defined Networking (SDN),"
https://www.opennetworking.org/.
[b-SDN-WS Nakao] "Deeply Programmable Network", Emerging Technologies for Network
Virtualization, and Software Defined Network (SDN), ITU-T Workshop on Software
Defined Networking (SDN), http://www.itu.int/en/ITU-T/Workshops-and-
Seminars/sdn/201306/Documents/KS-Aki_Nako_rev1.pdf.
[b-Programmable Networks - Galis]–”Programmable Networks for IP Service Deployment” ISBN
1-58053-745-6, pp450, June 2004, Artech House Books,
http://www.artechhouse.com/International/Books/Programmable-Networks-for-IP-
Service-Deployment-1017.aspx,
[b-Cloud Survey –Heilig] - “A Scientometric Analysis of Cloud Computing Literature”- a review of
approx. 25,000 papers] - IEEE Transactions on Cloud Computing, Volume: PP, Issue: 99,
30 April 2014, ISSN: 2168-7161; DOI: 10.1109/TCC.2014.2321168
[b-ETSI NFV MANO] Network Functions Virtualisation (NFV) Management and Orchestration-
http://www.etsi.org/deliver/etsi_gs/NFV-MAN/001_099/001/01.01.01_60/gs_nfv-
man001v010101p.pdf
[b-FG IMT-2020 WS 5GMF Nakao] – Akihiro Nakao, “Overview of network softwarization and
adoption to 5G”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on network,
softwarization, Turin, Italy, 21 September 2015
[b-FG IMT-2020 WS Galis] – Alex Galis, “Challenges in network softwarization”, ITU-T Focus
Group on IMT-2020, Pre-meeting workshop on network softwarization, Turin, Italy, 21
September 2015
[b-FG IMT-2020 WS Manzalini] - Antonio Manzalini, Telecom Italia / IEEE SDN Committee:
“R&D status of network softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting
workshop on network softwarization, Turin, Italy, 21 September 2015
- 44 -
TD 208 (PLEN/13)
[b-FG IMT-2020 WS Wang] Yachen Wang, China Mobile: “Key technologies to support network
softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on network
softwarization, Turin, Italy, 21 September 2015
[b-FG IMT-2020 WS Tsuda] Toshitaka Tsuda, Waseda University: “CCN implementation by
network softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on
network softwarization, Turin, Italy, 21 September 2015
[b-4G America] 5G technology evolution recommendations
[b-NGMN] NGMN 5G white paper
[b-METIS] Updated scenarios, requirements and KPIs for 5G mobile and wireless system with
recommendations for future investigations
[b-MEF 22.1.1] Mobile back haul Implementation Agreement
[b-DMTF OVF] Distributed Management Task Force (DMTF) Open Virtualisation Format (OVF)
specification document number DSP0243_1.1.0, 2010-01-12
http://www.dmtf.org/sites/default/files/standards/documents/DSP0243_1.1.0.pdf
[b-P4] P4: Pat Bosshart, Dan Daly, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole
Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, David Walker, “Programming
Protocol-Independent Packet Processors”, http://arxiv.org/abs/1312.1719
[b-FLARE] FLARE: Nakao, Akihiro. "Software-defined data plane enhancing SDN and NFV."
IEICE Transactions on Communications 98.1 (2015): 12-19.
- 46 -
TD 208 (PLEN/13)
Appendix I
High-level network architecture for IMT-2020
Editor’s Note: Appendix I was produced during the FG-IMT 2020 focus group in order to
investigate gaps in standardization related to IMT-2020. While the request from SG-13 was to
deliver a report outlining standardization gaps, the consensus of the focus group was that the
working documents produced and used during the focus group work contained useful information
for future work and should be captured. Note, however, the focus group concentrated on producing
accurate descriptions of the standardization gaps in the main body of this document; some minor
errors may exist in the appendices. They are, however, the output of the focus group but are
provided for information only.
Editor’s Note: This appendix uses clause references in a form usually associated for normative text.
This is maintained for this report to align with references made in the main body of this report.
This is the final output document for the high-level network architecture for IMT-2020, which will
be integrated into a report to be submitted to SG13 plenary as a result of Focus Group on IMT-2020.
This work has been done with the help of many contributors from various organizations. We
appreciate all the contributors for the active works to improve this document.
1 Scope
This document describes the high-level view of network architecture for IMT-2020 including
requirements, gap analyses, and design principles of IMT-2020 with the aim of giving directions to
the relevant Study Groups in ITU-T in developing standards on network architecture in IMT-2020. It
should be noted that this document is based on the related works in ITU-R and other SDOs.
2 References
The following ITU-T Recommendations and other references contain provisions, which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editors indicated were valid. All Recommendations and other references are subject to revision; users
of this Recommendation are therefore encouraged to investigate the possibility of applying the most
recent edition of the Recommendations and other references listed below. A list of the currently valid
ITU-T Recommendations is published regularly.
Note – The reference to a document within this Recommendation does not give it, as a stand-alone
document, the status of a Recommendation.
- 4G America, 5G technology evolution recommendations.
- ITU-T Recommendation Y.2060, Overview of the Internet of things.
- 47 -
TD 208 (PLEN/13)
- ITU-T Recommendation Y.2065, Service and capability requirements for e-health monitoring
services.
- ITU-R Recommendation M.2083-0, Framework and overall objectives of the future development
of IMT for 2020 and beyond.
- METIS, Updated scenarios, requirements and KPIs for 5G mobile and wireless system with
recommendations for future investigations.
- NGMN, NGMN 5G white paper.
3 Terms and definitions
This deliverable defines the following terms:
Peak data rate is maximum achievable data rate under ideal conditions per user/device (in Gbit/s).
User experienced data rate is achievable data rate that is available ubiquitously4 across the coverage
area to a mobile user/device (in Mbit/s or Gbit/s).
Latency is the contribution by the network to the time from when the source sends a packet to when
the destination receives it (in ms).
Mobility in performance target point of view is the maximum speed at which a defined QoS and
seamless transfer between radio nodes which may belong to different layers and/or radio access
technologies (multi-layer/-RAT) can be achieved (in km/h).
Connection density is a total number of connected and/or accessible devices per unit area (per km2).
Energy efficiency is energy efficiency has two aspects:
on the network side, energy efficiency refers to the quantity of information bits transmitted
to/ received from users, per unit of energy consumption of the radio access network (RAN)
(in bit/Joule);
on the device side, energy efficiency refers to quantity of information bits per unit of energy
consumption of the communication module (in bit/Joule).
Spectrum efficiency is average data throughput per unit of spectrum resource and per cell5 (bit/s/Hz).
Area traffic capacity is total traffic throughput served per geographic area (in Mbit/s/m2).
4 Abbreviations and acronyms
This deliverables defines the following abbreviations:
AAA Authentication, Authorization, Accounting
APN Application Network
AR Augmented Reality
CGF Converged Gateway Function
4 The term “ubiquitous” is related to the considered target coverage area and is not intended to relate to an entire
region or country.
5 The radio coverage area over which a mobile terminal can maintain a connection with one or more units of radio
equipment located within that area. For an individual base station, this is the radio coverage area of the base station
or of a subsystem (e.g. sector antenna).
- 48 -
TD 208 (PLEN/13)
EPC Evolved Packet Core
GW Gateway
ICN Information Centric Networking
IMT International Mobile Telecommunications
IoT Internet of Things
IP Internet Protocol
KPI Key Performance Index
LWA LTE/WiFi Link Aggregation
NFV Network Function Virtualization
MNO Mobile Network Operator
MTC Machine Type Communication
NAS Non-Access Stratum
PGW Packet Data Network Gateway
QoE Quality of Experience
QoS Quality of Service
RAT Radio Access Technology
SDN Software Defined Networking
TWAG Trusted Wireless Access Gateway
UCF Unified Control Function
UE User Equipment
UHD Ultra High Definition
VNF Virtual Network Function
UE User Equipment
UHD Ultra High Definition
VNF Virtual Network Function
5 IMT-2020 use cases
In this clause, we review several use cases among others where IMT-2020 is used to enhance the
services and/or IMT-2020 should be enhanced to support the services.
5.1 Smart Grid
The Smart Grid is a new electricity network, which highly integrates the advanced sensing and
measurement technologies, information and communication technologies (ICTs), analytical and
decision-making technologies, automatic control technologies with energy and power technologies
and infrastructure of electricity grids.
The followings are the features which smart grid should support and also IMT-2020 has to satisfy to
provide Smart Grid services on the network.
- 49 -
TD 208 (PLEN/13)
– Observability: It enables the status of electricity grid to be observed accurately and timely by
using advanced sensing and measuring technologies
– Controllability: It enables the effective control of the power system by observing the status of
the electricity grid
– Timely analysis and decision-making: It enables the improvement of intelligent decision-
making process
– Self-adapting and self-healing capability: It prevents power disturbance and breakdown via
self-diagnosis and fault location
– Integration of renewable energy integration: It enables integrating the renewable energy such
as solar and wind as well as the electricity from micro-grid to support efficient and stable
energy delivery services for electric vehicle, smart home and others
5.2 E-Health
E-Health (electronic health) can be defined as the cost-effective and secure use of information and
communications technologies in support of health and health-related fields including health-care
services, health surveillance, health literature, health education, health knowledge, and health
research. E-Health systems continue to hold great promise for improving global access to health-care
services and health informatics, particularly in the developing world. The advancements of E-Health
in remotely administered medicine will also increasingly enable virtual multimedia delivery of
medical consultation, remote imaging services, specialized medical diagnostics, remote medical
procedures, etc. Standardized electronic medical records promise to facilitate the digital exchange of
patient data among a patient’s primary care physician and other health providers.
The followings are the features which E-Health should support and also IMT-2020 has to satisfy to
provide E-Health services on the network.
– Various access and massive communication: The increasing use of diagnostic tools such as
3D and 4D ultrasounds, CAT scans and MRIs, and the miniaturization of this equipment to a
portable/hand-held form factor will lead to even higher demands being placed on wireless
networks. In addition, Bio-connectivity, which is the continuous and automatic medical
telemetry (e.g., temperature, blood pressure, heart-rate, blood glucose) collection via wearable
sensors, is another strong emerging trend that will add to the wireless communications
requirements.
– Robust infrastructure: Electronic health records is still a central focus of standards
organizations, national e-health policies, and strategies within health systems. This is also an
area that continues to raise concerns about data security and privacy. As the use of massive
distributed computing resources to assist development of disease diagnostic and prevention
progresses are heard for standards that provide for robust infrastructure, deployment models
and interfaces.
– Real time multimedia interactions: The use of telecommunications networks and information
technology for healthcare services such as remote clinical care, diagnostics, and electronic
patient monitoring. Developments in this area include advancements in remote clinical care
technologies that enable doctors to provide medical assessments and treatments from a remote
location away from the patient via real time multimedia interactions with a patient such as a
video feed transmitted over a telecommunications network.
– Ultra-reliable and low latency communications: The network provider needs support for
providing access to E-Health applications as fast as possible upon service request.
- 50 -
TD 208 (PLEN/13)
– Quality of service: The network provider needs support for obtaining the customer's E-Health
service-related information in order to allocate or configure for the E-Health customer the
appropriate network resources, such as IP address, network bandwidth, QoS policy, and so
on.
– Policy-based communication: The network layer is required to provide policy-based
communication for E-Health applications and E-Health devices. Policy is a set of rules whose
variables include, but are not limited to, time, bandwidth, data throughput, network type,
traffic priority, and so on. By means of policy-based communication, E-Health applications
and E-Health devices can obtain the desired QoS.
– Network-based locating: The network layer is recommended to provide the location related
information from the network layer (e.g., IP address, access point location, and so on) for
locating the position of E-Health devices. Event triggered location information notification is
recommended to be supported.
– Network resource provision: The network layer is required to provide the network resource
provision capability for E-Health applications and E-Health devices. Depending on the
specific deployment of E-Health applications and E-Health devices, E-Health applications
and E-Health devices may automatically use these provided network resources and configure
themselves to connect to the network directly. In this way, E-Health customers can use the E-
Health services directly, without the need to configure the E-Health devices
– Secure communications: The information carried by the E-Health services may be delivered
across different administrative domains (e.g., countries, operators). The E-Health system
supports secure communications between different domains. The information exchanged
between different domains must be protected from random errors, as well as snooping or
hacking attacks.
– Confidentiality: Whenever information is exchanged, stored or processed, the confidentiality
of the data must be enforced and safeguarded by the E-Health system. All exchanges of data
between e-health partners, for example E-Health device provider, E-Health application
provider, network provider and platform provider, must be performed in a way that prohibits
any unwanted disclosure of data, e.g., to third parties.
– Integrity: The integrity of the transmitted information must be guaranteed; transmitted data
from the sender should be received without any alteration. It must be identified that the
transmitted data have not been damaged, reduced or altered. Any loss of integrity of the
transmitted data must be recognizable by the recipient.
– Data storage security: It is recommended to support data storage security strategies including,
but not limited to, data backup, anti-hacker data protection, uninterruptible power of data
storage, data integrity validation and data recovery. In addition, data access control is required
to be supported for privacy
5.3 Autonomous car
An autonomous car, also known as an uncrewed vehicle, driverless car, self-driving car and robotic
car, is an autonomous vehicle which is capable of fulfilling the main transportation capabilities of a
traditional car by sensing its environment and navigating without human input. The implementation
of autonomous cars could theoretically lead to many improvements in transportation, including a
reduction in car accidents and obstacles successfully.
For this, V2X techniques may be used. Connected-vehicle systems use wireless technologies to
communicate in real time from vehicle to vehicle (V2V) and from vehicle to infrastructure (V2I), and
- 51 -
TD 208 (PLEN/13)
vice versa. The convergence of communication- and sensor-based technologies, therefore, could
deliver better safety, mobility, and self- driving capability than either approach could deliver on its
own.
The followings are the features which autonomous car should support and also IMT-2020 has to
satisfy to provide autonomous car services on the network.
– Dependency on Sensors: Although connected vehicle solutions can communicate with the
external environment, sensor-based solutions will need to co-exist in order to cover situations
that involve obstacles - for example, obstructions in the road or pedestrians- that would not
be connected and communicating with the network.
– Data Security: Numerous security threats will arise once personal mobility is dominated by
self-driving vehicles. Unauthorized parties, hackers, or even terrorists could capture data, alter
records, instigate attacks on systems, compromise driver privacy by tracking individual
vehicles, or identify residences.
– Enhanced massive vehicle type communications: A significant number of connected devices
are expected to use IMT systems. In addition, as more and more things get connected, various
services that utilize the connection capabilities of things will appear.
– Ultra-reliable and low latency communications: Reliability and latency are the essentially
required for the safe running of autonomous cars.
5.4 Internet of things
A global infrastructure for the information society, enabling advanced services by interconnecting
(physical and virtual) things based on existing and evolving interoperable information and
communication technologies. From the perspective of technical standardization, the IoT can be
viewed as a global infrastructure for the information society, enabling advanced services by
interconnecting (physical and virtual) things based on existing and evolving interoperable
information and communication technologies (ICTs). Physical things exist in the physical world and
are capable of being sensed, actuated and connected. The examples of physical things include the
surrounding environment, industrial robots, goods and electrical equipment. Virtual things exist in
the information world and are capable of being stored, processed and accessed. The examples of
virtual things include multimedia content and application software. Through the exploitation of
identification, data capture, processing, and communication capabilities, the IoT makes full use of
things to offer services to all kinds of applications, whilst ensuring that security and privacy
requirements are fulfilled.
The followings are the features which IoT should support and also IMT-2020 has to satisfy to provide
IoT services on the network.
– High connection density: With regard to the IoT, anything can be interconnected with the
global information and communication infrastructure.
– Multiple heterogeneous access networks: The devices in the IoT are heterogeneous as based
on different hardware platforms and networks. They can interact with other devices or service
platforms through different networks
– Autonomic networking: Autonomic networking (including self-management, self-
configuring, self-healing, self-optimizing and self-protecting techniques and/or mechanisms)
needs to be supported in the networking control functions of the IoT, in order to adapt to
different application domains, different communication environments and large numbers and
types of devices.
- 52 -
TD 208 (PLEN/13)
– Security: In the IoT, every 'thing' is connected which results in significant security threats,
such as threats towards confidentiality, authenticity and integrity of both data and services. A
critical example of security requirements is the need to integrate different security policies
and techniques related to the variety of devices and user networks in the IoT.
– Manageability: Manageability needs to be supported in the IoT in order to ensure normal
network operations. IoT applications usually work automatically without the participation of
people, but their whole operation process should be manageable by the relevant parties.
– Energy efficiency: Sensor needs long life time activities.
– Networking capabilities: Providing relevant control functions of network connectivity, such
as access and transport resource control functions, mobility management or authentication,
authorization and accounting (AAA).
– Transport capabilities: Focus on providing connectivity for the transport of IoT service and
application specific data information, as well as the transport of IoT-related control and
management information.
– Local network topology management: Traffic and congestion management, such as the
detection of network overflow conditions and the implementation of resource reservation for
time-critical and/or life-critical data flows
6 Performance targets for IMT-2020
The performance parameters for so-called 5G network are defined separately in related SDOs,
research projects, and industry associations; the parameters are similar but the target values of the
parameters show subtle differences with each other. ITU-R, among them, identified the following
eight key capabilities and the targets for IMT-2020 in recommendation M.2083-0 , mostly from the
radio access network points of view while they are still quite relevant to its network as well, which
are subject to be changed according to future studies.
Table 1. IMT-2020 key capabilities in ITU-R
Parameters Target
User experienced data rates 100 Mbps
Peak data rates 20 Gbps
Mobility up to 500 km/h with acceptable QoS
Latency (air interface) 1 ms
Connection density 106 /km2
Network energy efficiency 100 times better than IMT-Advanced
Spectrum efficiency 3 times better IMT-Advanced
Area traffic capacity 10 Mbit/s/m2
All the other performance targets from ITU-R can be directly applied to the design of network
architecture, but the target for the latency is set only for the air interface in M.2083-0. However, when
we consider the key capabilities from other sources such as METIS 2020 project, the target for the
end-to-end latency is expected to be around 5 ms ~ 10 ms depending on the service characteristics.
- 53 -
TD 208 (PLEN/13)
7 Requirements and gap analysis
7.1 Enhanced mobile broadband services
More and more user devices are being equipped with enhanced media consumption capabilities, such
as Ultra-High Definition display, multi-view High Definition display, mobile 3D projections,
immersive video conferencing, and augmented reality and mixed reality display and interface. This
will all lead to a demand for significantly higher data rates in IMT-2020.
The demand for mobile high-definition multimedia also keeps increasing in many areas beyond
entertainment, such as medical treatment, safety, and security, which is well reflected to the
performance targets for connection density and area traffic capacity in ITU-R recommendation
M.2083-0.
Editor’s note: the tables containing the descriptions of the gaps have been deleted from this appendix.
The final texts describing the standardization gaps are included in the main body of this Report.
Where a draft table existed, a reference to the specific text in Clause 7 of the report is made.
Gap A.1: Various bandwidth/data-rates demands. See Clause 7.1.1 of the main body of this report.
Gap A.2: Complex connectivity model. See Clause 7.1.1 of the main body of this report.
Gap A.3: Application-aware and distributed network architecture. See Clause 7.1.1 of the main
body of this report.
7.2 Enhanced massive machine type communications
In IMT-2020 networks, almost every object that can benefit from being connected is expected to be
connected through wired or wireless internet technologies, which will lead to a situation where the
number of connected devices exceeds the number of human user devices. These connected “things”
can be various ranging from low-complexity devices to highly complex and advanced devices. As
more and more things get connected, various services that utilize the connection capabilities of things
will appear: smart energy distribution grid system, agriculture, healthcare, vehicle-to-vehicle and
vehicle-to-road infrastructure communication.
At least one hundred thousand simultaneous active connections per square kilometre, which will be
mostly coming true by the deployment of those massive MTC (machine type communications)
devices, shall be supported in an IMT-2020 network. Consistent end-to-end user experience should
also be provided even in the presence of that large number of concurrent connections.
Gap A.4: Signalling complexity in massive MTC. See Clause 7.1.1 of the main body of this report.
7.3 Ultra-reliable and low latency communications
The new applications with very low latency and real-time constraints are expected to be prevalent in
IMT-2020 networks: driverless cars, enhanced mobile cloud services, real-time traffic control
optimization, emergency and disaster response, smart grid, e-health, augmented reality, remote tactile
control, and tele-protection are some of the examples.
Gap A.5: Increasing service availability. See Clause 7.1.1 of the main body of this report.
Gap A.6: Signalling to reduce end-to-end complexity. See Clause 7.1.1 of the main body of this
report.
- 54 -
TD 208 (PLEN/13)
Gap A.7: End-to-end network latency model. See Clause 7.1.1 of the main body of this report.
7.4 Flexibility and programmability
An IMT-2020 network, as an integrated common core network, will be flexible enough to support
extremely variety of requirements in user devices and application services. Therefore, the IMT-202
network is envisioned as a network where multiple logical network instances tailored to various
requirements can be created. As a basic feature to realize this, the separation of control and data planes
in IMT-2020 network is needed, which enables the components of an IMT-2020 network to be
reconfigured, upgraded or even replaced easily with those of other vendors. NFV is expected to do a
significant role in making the IMT-2020 network more flexible by realizing network components as
software components. We should note that the reality would not allow all the required network
functions to be softwarized mainly because of the performance reason.
The openness given by the separation of control and data planes also makes the network
programmable by controlling/steering traffic depending on user specific requirements and some use-
cases.
Gap A.8: Mobile network optimized softwarization architecture. See Clause 7.1.1 of the main body
of this report.
Gap A.9: Data plane programmability. See Clause 7.1.1 of the main body of this report.
7.5 Quality of service
IMT-2020 network should provide consistent user experience and differentiated services in various
aspects such as throughput, latency, resilience and costs per bit depending on service level agreement
(SLA) of a user or its application.
Gap A.10: End-to-end QoS framework. See Clause 7.1.1 of the main body of this report.
7.6 Energy efficiency
IMT-2020 networks should meet all the other requirements and challenges in energy efficient
manners. An IMT-2020 network should support up to 100 times better energy efficiency than IMT-
Advanced in spite of 1000 times traffic increase without sacrificing the other performance targets. In
reality, however, appropriate trade-off will be allowed between the energy efficiency and other
performance requirements depending on the characteristics of user devices or applications.
Gap A.11: Energy efficiency. See Clause 7.1.1 of the main body of this report.
7.7 Enhanced privacy and security
IMT-2020 networks should provide robust and secure solutions for mission-critical applications such
as smart girds, telemedicine, public safety, etc. to counter the threats to security and privacy brought
by new radio technologies, new services and new deployment cases.
Gap A.12: Enhancement of privacy and security. See Clause 7.1.1 of the main body of this report.
Gap A.13: Enhancement identity management. See Clause 7.1.1 of the main body of this report.
- 55 -
TD 208 (PLEN/13)
7.8 Multiple heterogeneous radio access networks
The use of multiple heterogeneous radio access networks, including Wi-Fi networks, and their
interworking with each other in existing IMT networks are becoming prevalent with various
approaches: LTE/WiFi link Aggregation (LWA), interworking with ePDG or TWAG (trusted
wireless access gateway), etc. The trend is also expected to be continued in IMT-2020 networks, but
with more advanced and efficient ways. The multi-connectivity through the multiple available radio
access networks improves the robustness of the network as well as the throughput performance.
Especially, the dual connectivity of an existing IMT-network and a new IMT-2020 network will help
ensure the smooth introduction of IMT-2020 networks.
Gap A.14: Multi-RAT connectivity. See Clause: 7.1.1 of the main body of this report.
7.9 Fixed-mobile convergence
IMT-2020 core network is envisioned as a converged access-agnostic core (i.e., where identity,
mobility, security, etc. are decoupled from the access technology), which integrates multiple
heterogeneous radio access networks as well as fixed networks on an IP basis.
Gap A.15: Fixed mobile convergence. See Clause 7.1.1 of the main body of this report.
Enhanced on-demand mobility management
IMT-2020 should support a wide range of mobility options. Only around 30 % of total subscribers
are actually mobile even in the current IMT networks according to some of MNOs’s observation.
Therefore, IMT-2020 should not assume the same mobility support for all devices and application
services but rather provide mobility on demand only to those that need it. While mobility is not
required for some stationary devices such as smart meters and CPE devices, but we also need to
provide mobility for high-speed trains running at 500 km/h. The service continuity levels also varies:
seamless mobility, nomadic mobility, mobility for sporadic transmission, etc.
Gap A.16: Flexible mobility. See Clause 7.1.1 of the main body of this report.
Gap A.17: Mobility management for distributed flat network. See Clause 7.1.1 of the main body of
this report.
7.10 Operation and management
The current status of having its own proprietary network management protocol in every different
vendor should be enhanced by supporting a standard open interface so that a convergence network
management system can control all different network devices as shown Figure 1. In addition to the
standard management protocol, an IMT-2020 network should support common OAM protocols in
IP-based transport network to enhance sustainability and reliability.
- 56 -
TD 208 (PLEN/13)
Figure 1. Standardized network management and OAM.
Gap A.18: End-to-end network management in a multi-domain environment. See Clause 7.1.1 of
the main body of this report.
Gap A.19: OAM protocols. See Clause 7.1.1 of the main body of this report.
- 57 -
TD 208 (PLEN/13)
8 Structuring of IMT-2020 requirements
Figure 2. Structuring of requirements.
Figure 2 describes the structuring IMT-2020 requirements based on the gap analysis to give an
overview of vision of IMT-2020 network architecture.
8.1 Access network-agnostic and unified core network
The introduction of a new mobile technology has been accompanied with a new packet core network
in the legacy IMT networks. Therefore, the interworking issue between the new core network and
legacy core networks has always been a technical challenge to overcome.
The IMT-2020 network is envisioned to be an access network-agnostic architecture whose core
network will be a common unified core network for emerging new radio access technologies for IMT-
2020 as well as existing fixed and wireless networks (e.g., Wi-Fi). The access technology-agnostic
unified core network should be accompanied by common control mechanisms which are decoupled
from access technologies.
8.2 Distributed network architecture
The IMT-2020 network should be flexible enough to handle the explosive increase of traffic from the
new emerging bandwidth-hungry services such as ultra-high definition (UHD) TV, augmented reality
(AR), video conferencing, remote medical treatment, etc. The heavily centralized architecture onto
an anchor node of existing IMT networks is expected to be changed to cope with the explosion of
mobile data traffic. This will require the gateways to the core network are expected to be located
closer to the cell sites resulting in a distributed network architecture.
Access-agnostic and Unified Core
Network
Distributed Network Architecture
Multi-RAT Integration and
Management
Flexible and Lightweight
Signaling
Latency Optimized Network
Resilient and Adaptable Network
Enhanced Mobile Broadband
Services
Enhanced Massive Machine Type
Communications
Ultra-reliable and Low Latency
Communications
Flexibility and Programmability
Quality of Service
(end-to-end)
Energy Efficiency
Enhanced Privacy and Security
Multiple Heterogeneous RAT
Fixed-Mobile Convergence
Enhanced Mobility
Operation and Management
- 58 -
TD 208 (PLEN/13)
The distributed network architecture will bring a significant reduction on backhaul and core network
traffic by enabling placing content servers closer to mobile devices and also be beneficial to the
latency of the services.
8.3 Integrated management of multi-RAT and fixed access networks
The IMT-2020 network should facilitate an integrated access network management for multiple radio
access networks including Wi-Fi and fixed access networks. The integrated multi-RAT and fixed
network management should support seamless and consistent user experience while moving across
different access networks, and also steer mobile devices to choose the most suitable access technology
in a seamless way. In addition, simultaneous multiple connections for a mobile device to multiple
RATs and fixed access networks should be supported to increase user experienced data rate through
the integrated management of multi-RAT and fixed access networks.
8.4 Flexible signaling
In the existing IMT networks, all different types of traffic are treated in a uniform procedure by a
monolithic bearer management and its accompanied signaling protocol. The characteristics of traffic
are expected to vary significantly from devices to devices and from applications to applications in
IMT-2020 networks. For example, as the number of IoT devices is expected to increase, the
intermittent short burst traffic from massive number of devices will cause signaling bottleneck.
Meanwhile, a full-fledged signaling may be still essential for the devices/applications in which the
support of mobility is more critical. Therefore, the IMT-2020 network should support flexible
signaling architecture.
8.5 Latency optimized network
The IMT-2020 network should be based on a proper network architecture to support low-latency
network services. The end-to-end latency may come along with the support of distributed network
architecture where application servers placed on network edges and flexible signaling architecture in
which light weight signaling can be supported for latency critical applications.
8.6 Extensible network
The IMT-2020 network should be flexible and extensible to cope with various and sometimes
conflicting service requirements adaptably instead of having a dedicated network for each emerging
new service. The IMT-2020 network should be future-proof as much as possible to accommodate
even unforeseeable use cases. The clear separation of control and data planes and the enabling
technologies are the basis to make the IMT-2020 network flexible and extensible.
9 High-level IMT-2020 network architecture
The IMT-2020 network architecture should be defined in the end as a reference architecture which
defines the functional entities and the interaction flows among the entities as well. In this document,
however, we only define a high-level view of IMT-2020 network architecture as a guide for the
reference architecture in the future standardization phase.
Network softwarization definitely will be one of the key technologies for IMT-2020 network to cope
with the various service requirements. The detailed softwarized IMT-2020 network is handled in
separate chapter. In this chapter, therefore, we focus on more fundamental elements which will
address the other requirements of the IMT-2020 network.
9.1 IMT-2020 network architecture
- 59 -
TD 208 (PLEN/13)
Figure 3. High-level IMT-2020 network architecture.
Error! Reference source not found. shows the high-level IMT-2020 network architecture. An IMT-
2020 network differentiates itself from legacy IMT networks by further evolution and revolution as
well in radio network, front/back-haul networks, and core networks. Multiple various access points,
including a new IMT-2020 RATs, Wi-Fi AP, and even fixed networks, are connected to a converged
data plane functions via an integrated access network so that mobile devices can be serviced through
an access technology-agnostic network core. The converged data plane functions are distributed to
the edges of an IMT-2020 common core network resulting in creating a distributed flat network. The
control plane functions, which are responsible for mobility management, QoS control, etc., controls
the user traffic to be served agnostically to the access networks to which it is attached.
IMT-2020 network architecture also can support massive native flexibility with the support of
network softwarization (network virtualization, functions virtualization, programmability, etc.)
depending on different service scenarios and requirements, which is a major differentiation from
existing IMT networks.
9.2 Functional elements in IMT-2020 network architecture
The key parts among all the required functional elements are described here. The detailed functional
architecture and definition of reference points will be discussed in standardization phase.
9.2.1 Data plane functions
The key data plane functions, which is expressed as converged data functions in the Error! Reference
source not found., include the following.
- IP flow management and control function:
This function provides a method to classify user traffic into individual service flows which can
be added, modified, and deleted separately. Quality of service is managed and guaranteed per
service flow.
- 60 -
TD 208 (PLEN/13)
- Application identification function:
This function is a traffic identification function to help control application flows according to
their service characteristics in data plane.
- Multi-RAT coordination function:
This function monitors the condition of multiple wireless networks and control the traffic flows
among selected wireless networks. The most suitable RAT may be selected as a sole access
network or multiple RATs can be selected to increase user experienced data rate.
- Computing and storage function:
This function provides the computing and storage resources at the edges of IMT-2020 core
network to support low latency services such as tactile internet more efficiently.
9.2.2 Control plane functions
The control plane functions may be centralized while parts of them may be locally distributed
depending on the requirements and also for the purpose of efficiency, each of which is expressed as
core control functions and access control functions, respectively.
The key control plane functions include the following.
- Unified session control function:
This function provides a method to control sessions in a unified signaling across multiple
different mobile access networks. This function should also address connectionless services by
providing light-weight signaling mechanism.
- Mobility control function:
This function provides a unified mobility control across multiple different mobile access
networks – same types of mobile access networks and heterogeneous mobile access networks.
- Multi-RAT control function:
This function manages the resources from multiple wireless networks as an integrated virtual
resource cooperating with multi-RAT coordination function in CGF.
- Policy management and QoS control function:
This function controls the service policies and QoS control policies of user and each service
flow based on the user and application identification.
- Identifier management function:
This function manages all the identifiers of mobile devices including device identifier of 3GPP-
types, MAC identifier of Wi-Fi, or other types of identifiers for user or device. All the identifiers
need to be managed in such a way that the identifiers can be cross checked with each other.
9.3 IMT-2020 interworking scenarios with legacy IMT networks
The current IMT networks has been developed through an evolutionary path starting from circuit-
based wireless networks to full IP-based mobile networks. The evolutionary approach of mobile
networks with the aim of providing seamless continuity among the networks has significantly
increased the complexity of the current mobile packet core.
The IMT-2020 core network is envisioned as an access agnostic common core network which will
bring a significant change to make it easier to interwork with a variety of new radio access
technologies. However, the tight coupled interworking of an IMT-2020 network with legacy IMT
networks will still bring the similar or even more complexity.
IMT-2020 network is expected to be designed with the consideration of Wi-Fi and fixed networks
with emerging IMT-2020 RAN as basic access networks which will be seamlessly integrated into an
- 61 -
TD 208 (PLEN/13)
IMT-2020 network. However, we need to provide existing IMT networks a migration path to IMT-
2020.
As the first option, legacy IMT networks are connected to an IMT-2020 network through an
interworking function, which means that the IP session continuity between IMT-2020 and legacy
networks can be provided but service continuity should be supported at higher layer solutions.
In the second option, evolved IMT networks are directly connected to an IMT-2020 network while
providing backward compatibility for mobile devices that only support legacy IMT networks. In this
case, IP session continuity as well as service continuity between IMT-2020 and legacy networks can
be provided.
(a) Option 1
(b) Option 2
Figure 4. IMT-2020 interworking options.
10 Contributors (in Alphabetical Order)
This is the list of all contributors who submitted any written form of comments or contributions.
– Ghani ABBAS, Ericsson
– Seong Gon CHOI, Chungbuk University
– Prasan DE SILVA, Spark New Zealand
– Takash EGAWA, NEC Corporation
– Alex GALIS, University College London
– Chul-Soo KIM, Inje University
– Namseok KO, ETRI
– Kyunghee Daniel LEE, Pai Jai University
– Oscar LOPEZ-TORREZ
Legacy IMT
core
networks
IMT-2020 common
core network
Legacy IMT access
networksIMT-2020 Fixed/WiFi
Interworking
Function
Evolved IMT
core
networks
IMT-2020 common
core network
Evolved IMT access
networksIMT-2020 Fixed/WiFi
- 62 -
TD 208 (PLEN/13)
– Dharmendra MISRA, Cognizant
– Noik PARK, ETRI
– Sherry SHEN, Nokia Networks
– Prakash SUTHAR, Cisco Systems
– Toshitaka TSUDA, Waseda University
– Jian WANG, Ericsson
Acknowledgement
This work was partially supported by the European Union 7th Framework Program DOLFIN project
(“Data centres optimization for energy-efficient and environmentally friendly internet”;
http://www.dolfin-fp7.eu), the EU H2020 5G PPP projects: 5GEX (“5G Multi-Domain Exchange” ;
https://5g-ppp.eu/5GEx) and SONATA ( “Service Programing and Orchestration for Virtualized
Software Networks”; https://5g-ppp.eu/sonata/) and the European Space Agency (ESA) INSTINCT
project (“Scenarios for integration of satellite components in future networks”;
https://artes.esa.int/projects/instinct).
- 63 -
TD 208 (PLEN/13)
Appendix II
Network Softwarization for IMT-2020 networks
Editor’s Note: Appendix II was produced during the FG-IMT 2020 focus group in order to
investigate gaps in standardization related to IMT-2020. While the request from SG-13 was to
deliver a report outlining standardization gaps, the consensus of the focus group was that the
working documents produced and used during the focus group work contained useful information
for future work and should be captured. Note, however, the focus group concentrated on producing
accurate descriptions of the standardization gaps in the main body of this document; some minor
errors may exist in the appendices. They are, however, the output of the focus group but are
provided for information only.
Editor’s Note: This appendix uses clause references in a form usually associated for normative text.
This is maintained for this report to align with references made in the main body of this report.
This document is the deliverable of Network Softwarization for IMT-2020 networks. It contains all
the revision proposed in the editorial meeting of 27-30 October2015.
The structure of this document is as follows: Section 2 presents the relevant references; Section 3
presents the terms defined in this document and the terms defined elsewhere used in this document;
Section 4 presents the abbreviations; Section 5 states that there are no conventions used in this
document; Section 6 presents the network softwarization and its main features including:
Motivations; Relevant Use Cases; Overview of network softwarization; Characteristics of network
softwarization; Energy management aspects of Network softwarization and Economic incentive
aspects of network softwarization. It includes the related standardisation gaps analysis; Sections 7, 8,
9 present the technology areas that would utilize network softwarization technologies in 5G mobile
networks (e.g. Integrated Network Management and Orchestration; Mobile Edge Computing;
Distributed Cloud for Service Providers; In-network Processing; Resource Usage Optimization;
Resource Abstraction; Migration towards softwarized networks, RAN Virtualization; Capability
Exposure) including the related standardization gaps analysis; Clause 17.1 presents satellite networks
aspects of network softwarization; Clause 17.2 presents legacy reduction techniques; Clause 17.3
presents Standardization efforts of Mobile Edge Computing; Clause 17.4 presents supplemental
figures on network softwarization; Acknowledgement and Contributors list are completing this
document.
- 64 -
TD 208 (PLEN/13)
Draft deliverable of Network softwarization for IMT-2020 networks
1 Scope
This report explores the technology areas of study in network softwarization 6for resolving challenges
for realizing IMT-2020 visions in order to identify a gap to be filled by ITU-T Study Group 13 (SG13)
studies. It covers the non-radio parts 7of the IMT-2020 networks. In this document the terms ‘IMT-
2020’ and ‘5G’ are used interchangeably.
2 References
The following ITU-T Recommendations and other references contain provisions that, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the currently
valid ITU-T Recommendations is regularly published.
The reference to a document within this Recommendation does not give it, as a stand-alone document,
the status of a Recommendation.
[ITU-T Y.3001] Recommendation (2012) - Future networks: Objectives and design goals -
http://www.itu.int/rec/T-REC-Y.3001-201105-I;
[ITU-T Y.3021] Recommendation (2012) - Framework of Energy Saving in Future Networks -
http://www.itu.int/rec/T-REC-Y.3021-201201-I;
[ITU-T Y.3031] Recommendation (2012) - Identification framework in future networks -
http://www.itu.int/rec/T-REC-Y.3031-201205-I;
[ITU-T Y.3011] Recommendation ITU-T Y.3011 (2012), Framework of network virtualization for
future networks – http://www.itu.int/rec/T-REC-Y.3011-201201-I;
[ITU-T Y.3012] Recommendation ITU-T Y.3012 (2014), Requirements of network virtualization
for future networks - https://www.itu.int/rec/T-REC-Y.3012;
[ITU-T Y.3300] Recommendation (2014) - Framework of software-defined networking -
https://www.itu.int/rec/T-REC-Y.3300-201406-I;
[ITU-T Y.3500] Recommendation (2014) - Cloud computing – Overview and vocabulary-
http://www.itu.int/rec/T-REC-Y.3500-201408-I;
[ITU-T Y.3510] Recommendation (2013) - Cloud computing infrastructure requirements –
https://www.itu.int/ITU-T/rec/T-REC-Y.3510;
[ITU-T Y.3502] Recommendation (2014) - Cloud computing - Reference architecture –
https://www.itu.int/ITU-T/rec/T-REC-Y.3502;
6 The definition of the terminology “Network Softwarization” is described in 3.2.
7 Note that we include in the scope the technology areas that span across the boundary between wireless and wired networks, e.g., C-RAN (Cloud
Radio Access Network), end-to-end slices over resources including RATs (Radio Access Technologies), etc.
- 65 -
TD 208 (PLEN/13)
[ITU-T Y.3511] Recommendation (2014) - Framework of inter-cloud computing -
https://www.itu.int/rec/T-REC-Y.3511;
[ITU-T Y.3512] Recommendation (2014) - Cloud computing - Functional requirements of Network
as a Service - http://www.itu.int/rec/T-REC-Y.3512-201408-P;
[ITU-T Y.3513] Recommendation (2014) - Cloud computing - Functional requirements of
Infrastructure as a Service - http://www.itu.int/rec/T-REC-Y.3513-201408-I ;
[ETSI NFV] ETSI ISG NFV, Network Functions Virtualisation,
http://portal.etsi.org/portal/server.pt/community/NFV
[IETF RFC 3746] IETF RFC 3746 (2004), Forwarding and Control Element Separation (ForCES)
Framework.
[IETF RFC 7149] IETF RFC 7149 (2014), Software-Defined Networking: A Perspective from
within a Service Provider Environment.
[IETF SFC] IETF Service Function Chaining (sfc) working group,
http://datatracker.ietf.org/wg/sfc/charter/
[ONF] Open Networking Foundation, "OpenFlow/Software-Defined Networking (SDN),"
https://www.opennetworking.org/.
[SDN-WS Nakao] "Deeply Programmable Network", Emerging Technologies for Network
Virtualization, and Software Defined Network (SDN), ITU-T Workshop on Software
Defined Networking (SDN), http://www.itu.int/en/ITU-T/Workshops-and-
Seminars/sdn/201306/Documents/KS-Aki_Nako_rev1.pdf.
[Programmable Networks - Galis]–”Programmable Networks for IP Service Deployment” ISBN 1-
58053-745-6, pp450, June 2004, Artech House Books,
http://www.artechhouse.com/International/Books/Programmable-Networks-for-IP-
Service-Deployment-1017.aspx,
[Cloud Survey –Heilig] - “A Scientometric Analysis of Cloud Computing Literature”- a review of
approx. 25,000 papers] - IEEE Transactions on Cloud Computing, Volume: PP, Issue: 99,
30 April 2014, ISSN: 2168-7161; DOI: 10.1109/TCC.2014.2321168
[Draft ETSI GS MEC 002 V0.4.2(2015-07)] Mobile-Edge Computing (MEC); Technical
Requirements
[ETSI NFV MANO] Network Functions Virtualisation (NFV) Management and Orchestration-
http://www.etsi.org/deliver/etsi_gs/NFV-MAN/001_099/001/01.01.01_60/gs_nfv-
man001v010101p.pdf
[FG IMT-2020 WS 5GMF Nakao] – Akihiro Nakao, “Overview of network softwarization and
adoption to 5G”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on network,
softwarization, Turin, Italy, 21 September 2015
[FG IMT-2020 WS Galis] – Alex Galis, “Challenges in network softwarization”, ITU-T Focus
Group on IMT-2020, Pre-meeting workshop on network softwarization, Turin, Italy, 21 September
2015
[FG IMT-2020 WS Manzalini] - Antonio Manzalini, Telecom Italia / IEEE SDN Committee: “R&D
status of network softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on
network softwarization, Turin, Italy, 21 September 2015
[FG IMT-2020 WS Wang] Yachen Wang, China Mobile: “Key technologies to support network
softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on network
softwarization, Turin, Italy, 21 September 2015
- 66 -
TD 208 (PLEN/13)
[FG IMT-2020 WS Tsuda] Toshitaka Tsuda, Waseda University: “CCN implementation by network
softwarization”, ITU-T Focus Group on IMT-2020, Pre-meeting workshop on network
softwarization, Turin, Italy, 21 September 2015
[ITU-R IMT Vision] ”Framework and overall objectives of the future development of IMT for 2020
and beyond,” ITU-R、Document 5/199-E、19 June 2015.
3 Terms defined in this report
3.1 Terms defined elsewhere
This Recommendation uses the following terms defined elsewhere:
3.1.1 future network (FN) [ITU-T Y.3001]: A network able to provide services, capabilities, and
facilities difficult to provide using existing network technologies. A future network is either:
a) A new component network or an enhanced version of an existing one, or
b) A heterogeneous collection of new component networks or of new and existing component
networks that is operated as a single network.
NOTE – The plural form "Future Networks" (FNs) is used to show that there may be more than one
network that fits the definition of a future network.
3.1.2 network virtualization [ITU-T Y.3011]: A technology that enables the creation of logically
isolated network partitions over shared physical networks so that heterogeneous collection of multiple
virtual networks can simultaneously coexist over the shared networks. This includes the aggregation
of multiple resources in a provider and appearing as a single resource
3.1.3 software-defined networking [ITU-T Y.3030]: A set of techniques that enables to directly
program, orchestrate, control and manage network resources, which facilitates the design, delivery
and operation of network services in a dynamic and scalable manner.
3.1.4 energy saving within networks [ITU-T Y.3021]: This is where network capabilities and their
operations are set up in a way that allows the total energy for network equipment to be systematically
used in an efficient manner, resulting in reduced energy consumption, compared with networks that
lack these capabilities and operations.
NOTE – Network equipment includes routers, switches, equipment at the terminating point e.g., optical
network units (ONUs), home gateways, and network servers such as load balancers and firewalls. Network
equipment is typically composed of various components such as switching fabric, line cards, power supply,
and cooling.
3.1.5 cloud service customer [ITU-T Y.3501]: A person or organization that consumes delivered
cloud services within a contract with a cloud service provider.
3.1.6 cloud service provider [ITU-T Y.3501]: An organization that provides and maintains delivered
cloud services.
3.1.7 management system [ITU-T M.60]: A system with the capability and authority to exercise
control over and/or collect management information from another system.
3.1.8 device [ITU-T Y.3021]: This is the material element or assembly of such elements intended to
perform a required function.
3.1.9 equipment ITU-T Y.3021]:A set of devices assembled together to form a physical entity to
perform a specific task.
3.1.10 virtual resource [ITU-T Y.3011]: An abstraction of physical or logical resource, which may
have different characteristics from the physical or logical resource and whose capability may not be
bound to the capability of the physical or logical resource.
3.1.11 logical resource [ITU-T Y.3011]: An independently manageable partition of a physical
resource, which inherits the same characteristics as the physical resource and whose capability is
- 67 -
TD 208 (PLEN/13)
bound to the capability of the physical resource.
NOTE – "independently" means mutual exclusiveness among multiple partitions at the same level.
3.1.12 resource management [ITU-T Y.3520]:: The most efficient and effective way to access,
control, manage, deploy, schedule and bind resources when they are provided by service providers
and requested by customers.
3.1.13 hypervisor [ITU-T Y.3510]: A type of system software that allows multiple operating systems
to share a single hardware host.
NOTE –Each operating system appears to have the host's processor, memory and other resources, all to itself
3.1.14 virtual machine [DMTF OVF]: The complete environment that supports the execution of
guest software.
3.1.15 identifier [ITU-T Y.2091]: An identifier is a series of digits, characters and symbols or any
other form of data used to identify subscriber(s), user(s), network element(s), function(s), network
entity(ies) providing services/applications, or other entities (e.g., physical or logical objects).
3.1.16 locator (LOC) [ITU-T Y.2015]: A locator is the network layer topological name for an
interface or a set of interfaces. LOCs are carried in the IP address fields as packets traverse the
network.
NOTE – In this Recommendation, locators are also referred to as location IDs.
3.1.17 node ID [ITU-T Y.2015]: A node ID is an identifier used at the transport and higher layers to
identify the node as well as the endpoint of a communication session. A node ID is independent of
the node location as well as the network to which the node is attached so that the node ID is not
required to change even when the node changes its network connectivity by physically moving or
simply activating another interface. The node IDs should be used at the transport and higher layers
for replacing the conventional use of IP addresses at these layers. A node may have more than one
node ID in use.
NOTE – This Recommendation specifies a node ID structure.
3.1.18 name [ITU-T Y.2091]: A name is the identifier of an entity (e.g., subscriber, network
element) that may be resolved/translated into address.
3.1.19 domain [ETSI NFV MANO]:
Administrative domain is a collection of systems and networks operated by a single organization or
administrative authority. Infrastructure domain is an administrative domain that provides virtualised
infrastructure resources such as compute, network, and storage or a composition of those resources
via a service abstraction to another Administrative Domain, and is responsible for the management
and orchestration of those resources.
NOTE1: Different networks and different parts of a network may be built as different domains
using separate technologies or having different control paradigms,
NOTE2: Different networks and different parts of a network may be owned by a single
administration creating an administrative domain. Services are enabled and managed over multiple
administrations or over multi-domain single administration.
NOTE3: Multitenancy domain refers to set of physical and /or virtual resources in which a single
instance of a software runs on a server and serves multiple tenants. A tenant is a group of users who
share a common access with specific privileges to the software instance. A service or an application
may be designed to provide every tenant a dedicated share of the instance including its data,
configuration, user management, tenant individual functionality and non-functional properties.
- 68 -
TD 208 (PLEN/13)
3.2 Terms defined in this recommendation
This Recommendation defines the following terms:
3.2.1 Network Softwarization: An overall transformation trend for designing, implementing,
deploying, managing and maintaining network equipment and/or network components by software
programming, exploiting the natures of software such as flexibility and rapidity all along the lifecycle
of network equipment / components, for the sake of creating conditions enabling the re-design of
network and services architectures, optimizing costs and processes, enabling self-management and
bringing added values in network infrastructures.
4 Abbreviations and acronyms
This Recommendation uses the following abbreviations and acronyms:
SDN Software Defined Networking
NFV Network Virtualization
LINP a logically isolated network partitions
5 Conventions
6 Network softwarization
6.1 Motivations
In preparing for wired networks in coming IMT-2020 era, a variety of changes in information and
telecommunication environment and social requirements related to network infrastructure should be
taken into account. Typical examples of these are as follow.
1. Video traffic already dominates the mobile communication traffic and still increasing. This requires
the network architecture having efficient video on demand delivery mechanism in terms of
network/server congestion reduction and shorter response time.
2. In many countries, disaster resilience is a key concern. Since network systems are a life line
infrastructure, they are expected to be robust. Increased network flexibility helps to respond this
request.
3. IoT and big data processing are booming. Future networks should provide with functions that fit
to efficient big data processing systems.
4. One of the major requirements for 5G is the very short delay. Total design including data processing
and service provisioning is necessary to fulfil the requirement.
5. SDN/NFV concept is expanding as a possible key technology for future networks.
To satisfy these requirements, it is appropriate that the 5G networks be built upon a new network
architectural model which provides flexibility in terms of network topology and functions, enabling
the creation of multiple logical networks dedicated to the support of specific services, the introduction
of emerging architectural paradigms such as ICN/CCN, and the realization of in-network data
processing and service provisioning provide by network nodes.
This flexibility objective can be achieved via Network softwarization. With the adoption of
SDN/NFV, software programmability of network nodes will expand, which in turn makes it feasible
to run information processing and service software on network nodes.
- 69 -
TD 208 (PLEN/13)
6.2 Relevant use cases
6.2.1 Support of various applications
In the 5G era, many new application services are expected to emerge to satisfy diverse needs and
requirements of users by leveraging innovative multimedia applications and telecommunication
technologies.
Figure 1 indicates that, from users’ perspectives, required capabilities vary depending on applications.
Four typical applications are used to illustrate the different capabilities required by respective
application.
(i) Video streaming
(ii) Virtual reality
(iii) M2M communication (i.e. sensors)
(iv) Autonomous driving (i.e. collision avoidance)
As users’ requirements differ depending on applications, the network does not necessarily have to
exhibit maximum performance capabilities, instead, the network resources should be used efficiently
depending on applications.
Figure 1 Diversified required capabilities from users’ perspective depending on applications
Gap analysis
It is envisioned that such an infrastructure that efficiently supports a diversified set of application
requirements across end-to-end paths, ranging from M2M communication, to autonomous and
collaborative driving, virtual reality and video streaming, etc. Network softwarization technologies
including SDN, NFV and their extensions for supporting 5G mobile networks are expected to provide
slicing capability both in wired and wireless parts of communication infrastructure, so that each slice
provides an isolated environment to efficiently accommodate individual applications meeting specific
requirements. The slice should be capable of dynamically adjusting resources to meet the application
requirements. The network infrastructure is expected to provide extreme flexibility to support those
different capabilities with reasonable cost.
- 70 -
TD 208 (PLEN/13)
6.2.2 Use of ICN for Inter-function transport
In the future 5G network, where a high degree of network function virtualization is expected either
explicitly in NFV or in network slices, the use of an ICN protocol for inter-function communications
is an attractive option because it decouples the location of services from the service request. The
concept of using ICN in NFV and SDN is studied in several academic works891011. ICN is well suited
for service oriented routing, because each element in a service chain can name the next element in
the service chain without the need for an external name resolver or manual configuration.
The initial deployment of virtualized functions inside a network Slice could use ICN technologies
immediately, as these are green-field services realized within a provider network 12 . Initial
implementations may require running ICN as a transport protocol over IP due to initial lack of
hardware support for native ICN transport, but this would be a transitional situation. Even when
running over an IP network layer, ICN services can still provide robust communications and endpoint
discovery using common existing IP techniques (e.g. mDNS, DNS SRV records, and distribute
rendezvous techniques, among others).
As data-plane programmable equipment enters the marketplace, native ICN slices and transport can
offer high-performance ICN/CCNx services. For example, abstracted 5G services in a CCNx slice,
such as MME, S-GW, and P-GW, could be implemented in software, in software with hardware assist,
or in deep-programmable hardware. In each case, the abstracted Slice service looks the same, though
each would offer different performance curves in terms of latency, throughput, and capacity. Likewise,
for inter-NFV communications, native wire-speed equipment, which is being demonstrated in 2015
by some manufacturers, would improve throughput and flexibility compared to using an IP-overlay,
but should not limit such deployments within the 5G timeframe.
The advantage of using ICN as the inter-function transport protocol, even in a transitional period over
IP, is that it positions carriers to move to an ICN native approach, which can discovery, recover, and
utilize carrier networks efficiently without centralized bottlenecks or points of failure. ICN
approaches also position the carrier for dynamic service mobility and deployment without needing to
track an IP underlay.
Gap analysis
There are both academic and commercial research activities for defining emerging network
architectures that do not assume the underlay network runs TCP/IP protocols. A representative
example of such network architectures is ICN (Information Centric Networking). Although the
8 Latre, Steven, et al. "The fluid internet: service-centric management of a virtualized future internet." Communications
Magazine, IEEE 52.1 (2014): 140-148.
9 Ravindran, Ravishankar, et al. "Towards software defined ICN based edge-cloud services." Cloud Networking
(CloudNet), 2013 IEEE 2nd International Conference on. IEEE, 2013.
10 TalebiFard, Peyman, et al. "Towards a context adaptive ICN-based service centric framework." Heterogeneous
Networking for Quality, Reliability, Security and Robustness (QShine), 2014 10th International Conference on. IEEE,
2014.
11 Nakao, Akihiro. "Software-defined data plane enhancing SDN and NFV." IEICE Transactions on Communications
98.1 (2015): 12-19.
12 Nakao, Akihiro. "Application Specific Slicing for MVNO through Software-Defined Data Plane Enhancing
SDN." IEICE Transactions on Communication, Vol. E98-B, No. 11, 2015.
- 71 -
TD 208 (PLEN/13)
current state of ICN could run on top of TCP/IP as an overlay, inherent benefits of the architecture
can be achieved if implemented natively, i.e., directly on top of the underlay, e.g., L1 or L2 networks.
There exists a gap in supporting such emerging network architecture in the current network
technology, especially when it uses such an emerging network architecture in the context of
heterogeneous service delivery and function chaining. Network softwarization provides slicing such
that such multiple emerging network architectures could be realized within individual slices.
Gap analysis
1. To fully realize benefit, need native ICN routing within a slice (e.g., on CRAN and backhaul).
There could be a case where inter-slice ICN routing is useful.
2. NFV and Slice implementations would need to use ICN technologies in their communications
models.
6.2.3 Use of ICN function state migration
ICN is a good technology choice for function state migration and execution context migration in
future 5G networks131415. Content Centric Networking (CCNx) facilitates process migration while
enabling many desirable features such as strong checkpointing and data de-duplication. Not all
migration techniques require strong checkpointing, and in those cases CCNx offers a faster and
weaker naming technique that allows pages or blocks to go dirty in a checkpoint.
CCNx offers an intuitive naming of resources that are part of a service or execution context migration
and building checkpoints around those resources for consistent state transfer.
De-duplication is a technique where only one copy of data exists and it is shared between multiple
instances. CCNx allows resources to be de-duplicated both within and between virtual machine
instances. For example, in the previous discussion about using hash names for resources, if two disk
blocks, for example, have the same hash value they will refer to the same Content Object. Only the
block index in the CCNx manifest will be different.
A VM hypervisor may also share blocks between VMs. When generating the names used to fetch a
checkpoint, the source migration agent running in the source hypervisor could use a name like
{/nyc/host7, hash = 0x63223…} so any instance or any component can share the same data. Assume
that the memory page size and the disk block size are the same. Then that name for hash 0x63223…
could be both a disk block and a RAM page of the same data (e.g. a shared library code section).
Because the manifest can point to different name prefixes for each hash and can indicate the virtual
resource of that hash, we can have the same physical bytes used for many purposes. This approach
may also be applied when page and block sizes are not the same by using smaller units of naming.
13 Taleb, Tarik, and Adlen Ksentini. "Follow me cloud: interworking federated clouds and distributed mobile networks." Network, IEEE 27.5 (2013): 12-19.
14 Karimzadeh, Morteza, Triadimas Satria, and Georgios Karagiannis. "Utilizing ICN/CCN for service and VM migration support in virtualized LTE systems." (2014): 84.
15 Crowcroft, Jon. "SCANDEX: Service Centric Networking for Challenged Decentralised Networks."
- 72 -
TD 208 (PLEN/13)
Gap analysis
1. An ICN (CCNx) transport within the CRAN or carrier network to facilitate ICN approaches
to state migration. The ICN technology could operate over an IP network during a
transitional period.
2. NFV or Slice component implementations would need to use ICN as their transport
technology to benefit from the name-based design and transfer features.
6.2.4 ICN removes host endpoint abstraction from application data
In a traditional IP-based network, the Internet Protocol adds a level of abstraction to communications
endpoints by assigning them a location-dependent name. When applications wish to communicate,
they must rendezvous those host addresses – such as with DNS or SIP or some other well-known
means – before communication can take place. Because the rendezvous is done outside the network
layer, the rendezvous protocol must employ its own means to determine locality – such as with ping
triangulation – to determine which replica to use. Some applications use IP anycast addressing to
move rendezvous back in to the network layer and realize those benefits. CCNx, as an ICN protocol,
naturally keeps rendezvous on addresses within the network layer so all applications can benefit from
localized services without needing to add on additional rendezvous layers with their own localization
protocols.
ICN may be used as a de-abstraction layer for virtualized functions: using direct function naming in
ICN means the network can move functions and change routing without needing to update
intermediate abstractions of endpoint identification. For example, a single host IP address might hide
many virtualized functions, so it may not be possible to directly move an IP address. One would need
orchestration to inform components of a new socket endpoint, which could result in service
interruption during the time when a function has finished migration and the time when an existing
prior service is notified of a new service endpoint. With CCNx, the orchestration does not need to
inform prior components of a new service address, it only needs to update the named routing to the
new location.
Because CCNx, as an example ICN protocol, is not tied to the P-GW identity – such as for the source
endpoint address – it means that CCNx is well suited for multiple P-GW egress. Service frameworks,
such as Mobile Edge Computing, could realize significant simplification by using a CCNx approach
for multiple P-GW egress without needing to assign the UE multiple identities or using layers of
address translation.
Gap analysis
1. To fully realize benefit, need native ICN routing within the CRAN and backhaul. ICN
routing within a slice is insufficient.
2. Deep data plan programmability, extended from SDN and NFV, and Slice
implementations would need to use ICN technologies in their communications models.
3. The CRAN would need to offer ICN routing, such as from a SIPTO P-GW exit at the
eNodeB. It is possible to run ICN as an IP overlay, but a native ICN routing would be
better.
- 73 -
TD 208 (PLEN/13)
6.3 Overview of network softwarization
Network Softwarization is an overall transformation trend for designing, implementing, deploying,
managing and maintaining network equipment and/or network components by software
programming, exploiting the natures of software such as flexibility and rapidity all along the lifecycle
of network equipment / components, for the sake of creating conditions enabling the re-design of
network and services architectures, optimizing costs and processes, enabling self-management and
bringing added values in network infrastructures.
The terminology, Network Softwarization, was first introduced in Academia, NetSoft 2015, the first
IEEE Conference on Network Softwarization, to include broader interests regarding Software
Defined Networking (SDN) and Network Functions Virtualisation (NFV), Network Virtualization,
Mobile Edge Computing, Cloud and IoT technologies.
6.4 Characteristics of network softwarization
Additional benefits from Network Softwarization include but are not limited to the following:
Network Softwarization enables global system qualities (e.g. execution qualities, such as usability,
modifiability, effectiveness, security and efficiency; evolution qualities, such as testability,
maintainability, reusability, extensibility, portability and scalability). Viable architectures for
network softwarization must be carefully engineered to achieve suitable trade-offs between
flexibility, performance, security, safety and manageability.
Network Softwarization provides a set of software techniques, methods and processes applicable to
a heterogeneous assembly of component networks or an enhanced version of an existing grouping of
network components that is operated as a single network.
Network Softwarization provides abstractions and programmability that are utilized to deliver
extreme flexibility in networks to support variety of applications and services, to accelerate service
deployment and to facilitate infrastructure self-management.
Network Softwarization enables the following high-level characteristics and capabilities, their
extensions, their trade-offs, unification and integration:
Network Virtualization (NV), which enables virtualization of network resources,
Network Function Virtualization (NFV), which permits virtualization of software-based
network functions. Instead of installing and managing dedicated hardware devices for these
networking and servicing functions, they are instead realized as software components and
deployed on commodity or special hardware infrastructures.
Network Programmability empowers the fast, flexible, and dynamic deployment of new
network and management services executed as groups of virtual machines in the data plane,
control plane, management plane as service plane in all segments of the network.
Programmable networks are networks that allow the functionality of some of their network
elements to be programmable dynamically. These networks aim to provide easy introduction
of new network services by adding dynamic programmability to network devices such as
routers, switches, and applications servers. Dynamic programming refers to executable code
that is injected into the execution environments of network elements in order to create the new
functionality at run time. The basic approach is to enable trusted third parties (end users,
operators, and service providers) to inject application-specific services (in the form of code)
into the network. Applications may utilize this network support in terms of optimized network
resources and, as such, they are becoming network aware. As such the behaviour of network
resources can be customized and changed through a standardized programming interface for
network control, management and servicing functionality. The key question is: how to exploit
- 74 -
TD 208 (PLEN/13)
this potential flexibility for the benefit of both the operator and the end user without
jeopardizing the integrity of the network. The answer lies in the promising potential that
emerges with the advent of programmable networks in the following aspects: Rapid
deployment of large number of new services and applications; Customization of existing
service features; Scalability and operational cost reduction in network and service
management; Independence of network equipment manufacturer; Information network and
service integration; Diversification of services and business opportunities.
Software-Defined Networking (SDN), which allows network control to be separated from the
forwarding plane and allows for a flexible management of the network resources which
facilitates the design, delivery and operation of network services in a dynamic and scalable
manner.
Software-defined Network Clouds - Cloudification of networking and servicing functions,
which enables ubiquitous network access to a shared services and shared pool of configurable
computing, connectivity and storage resources. It provide users and providers with various
capabilities to process and store their data and services in data centers. It relies on sharing of
resources to achieve coherence and economies of scale, similar to a utility (like the electricity
grid) over a network. It uses virtualization concepts such as abstraction, pooling, and
automation to all of the connectivity, compute and storage to achieve network services. It
could take also the kind of mobile edge computing architecture where cloud-computing
capabilities and an IT service environment are available at the edge of the mobile network or
fog architecture that uses one or a collaborative multitude of end-user clients or near-user edge
devices to execute a substantial amount of services (rather than in cloud data centers),
communication (rather than routed over the internet backbone), and control, configuration,
measurement and management.
6.5 Requirements for 5G specific network
(1) Harmonization of SDN and NFV - Coordination of the current SDN and NFV technologies
for realizing 5G mobile network is required.
(2) 5G Extensions to the current SDN and NFV - 5G network needs extreme flexibility in
supporting various applications and services with largely deferent requirements. Therefore,
5G specific extensions to the current SDN and NFV, especially pursuing even further and
deeper agile software programmability is required. For example, SDN data plane could be
enhanced to support deep programmability and NFV MEC needs light-weight management
for extreme edge network functions, especially in the area of access network and user
equipment (UE).
(3) Considerations for applicability of softwarization - Considering the trade-off between
programmability and performance is required. Especially in 5G context, it is important to
respect the performance improvement in wireless technologies. Therefore, it is necessary to
clearly define the area and criteria for applicability of softwarization in the infrastructure.
(4) Application driven 5G network softwarization - 5G mobile network is indispensable
communication infrastructure for various applications and services such as IoT/M2M and
content delivery. Rapid emergence of applications and services enabled in 5G mobile network
must be considered in designing and developing the infrastructure.
(5) 5G network softwarization energy characteristics - The architecture design, resulting
implementation and operation of 5G network softwarization are recommended to minimize
their environmental impact, such as explicit energy closed control loops that optimizes energy
consumptions and stabilization of the local smart grids at the smart city level.
- 75 -
TD 208 (PLEN/13)
(6) 5G network softwarization management characteristics - The architecture design, resulting
implementation and operation of 5G network softwarization are recommended to included
uniform and light-weight in-network self-organization, deeper autonomy, and autonomicity
as its basic enabling concepts and abstractions applicable to all components of 5Gnetwork.
(7) 5G network softwarization economic characteristics - The architecture design, resulting
implementation and operation of 5G network softwarization are recommended to consider
social and economic issues to reduce as target 50% the \systems and subsystems lifecycle and
operational costs in order for them to be deployable and sustainable, to facilitate appropriate
return for all actors involved in the networking and servicing ecosystem and to reduce their
barriers to entry.
6.6 Network softwarization in 5G mobile networks
6.6.1 Network softwarization
In 5G or IMT-2020 networks, the terminology Network Softwarization is used with the intention to
introduce various requirements of programmable software defined infrastructure, especially specific
extension for 5G mobile networks.
The basic concept of the Network Softwarization is “Slicing” as defined in [ITU-T Y.3011], [ITU-T
Y.3012]. Slicing allows logically isolated network partitions (LINP) with a slice being considered as
a unit of programmable resources such as network, computation and storage. Considering the wide
variety of application domains to be supported by 5G or IMT-2020 network, it is necessary to extend
the concept of slicing to cover a wider range of use cases than those targeted by the current SDN/NFV
technologies, and the need to address a number of issues on how to utilize slices created on top of
programmable software defined infrastructure.
Figure 2 Network softwarization view of the 5G mobile networks
- 76 -
TD 208 (PLEN/13)
Figure 2 illustrates the network softwarization view of 5G mobile networks, which consists of a
couple of slices created on a physical infrastructure by the “network management and orchestration”.
A slice is the collection of virtual or physical network functions connected by links to create an end-
to-end networked system. In this figure, the slice A consists of radio access network (RAN), mobile
packet core, UE(User Equipment)/device and cloud, each of which are collection of virtual or
physical network functions. Note that the entities are shown rather symbolically and links are not
described in Figure 2 for simplicity. The “network management and orchestration” manages the life
cycle of slices: creation, update and deletion. It also manages the physical infrastructure and virtual
resources, which are abstraction of physical resources. The physical infrastructure consists of
computation and storage resources that include UE/devices (e.g. sensors) and data centers, and
network resources that include RATs, MFH, MBH and Transport. It should be noted that both
computation/storage resources and network resources are distributed and are available for creating
virtual network functions.
In addition, the virtualized network functions and network programmability functions assigned to a
slice are controlled by the “slice control”. It oversees the overall end-to-end networked system by
configuring its entities appropriately. It may include network layer control, and service/application
layer control in some cases making 5G network control being service-aware. It depends on the
requirements presented for the end-to-end networked system as exemplify by the envisaged natively
supported ICN facilities.
The orchestration is central to the control and it defined as the sequencing of management operations.
A customer may send a request to the “network management and orchestration” with their own
requirement of an end-to-end service and steps follows. As such the new 5G control is governing,
synchronizing and enforcing the configuration of the natively supported NV / Slicing/ NFV and
network programmability facilities in the fronthaul, backhaul, core networks, software-defined clouds
and mobile edge computing. This involves:
Support for on demand composition of network functions and capabilities
Enforce required capability/capacity/security/elasticity/ adaptability/ flexibility “where and
when needed”
Services are executed in one (or more) Slices (i.e. a slice is made of a set of VMs)
Step 1: Creating a slice
Based on the requirement presented, the “network management and orchestration” creates virtual or
physical network functions and connects them as appropriate and instantiate all the network functions
assigned to the slice.
Step 2: (Re-) Configuring the slice
The slice control take over the control of all the virtualized network functions and network
programmability functions assigned to the slice, and (re-)configure them as appropriate to provide
the end-to-end service.
6.6.2 Horizontal extension of slicing
6.6.2.1 End-to-end slicing
In 5G mobile networks, the end-to-end communication quality is an important requirement.
Especially when wireless technologies are expected to advance, fixed network must support
facilitating the advancement of wireless part of end-to-end communications. Therefore, it is natural
to consider extending the slicing concept to end-to-end, i.e., from UE to Cloud. Issues in extending
- 77 -
TD 208 (PLEN/13)
slices in 5G mobile networks have then to be addressed, not only software defined infrastructure in a
limited part of a network, but also the entire end-to-end path including UE and Cloud.
Gap analysis
The scope of the current SDN technology primarily focuses on the portions of the network such as
data-centres, mobile and core networks. In 5G mobile network, it is necessary to consider end-to-end
application quality and enablement through network softwarization platform. Therefore, there exists
a gap between the current projection of SDN and NFV technology development and the requirements
for end-to-end application quality. The infrastructure for 5G mobile networks is desired to support
end-to-end control and management of slices and the composition of multiple slices, especially with
consideration of slicing over RATs and fixed parts of end-to-end paths. This gap has been analyzed
against what is defined in [ITU-T Y.3300].
6.6.2.2 End-to-end latency breakdown and programmability consideration
As presented at the pre-meeting of FG IMT-2020 on network softwarization at Turin, Italy, 21
September 2015 [FG IMT-2020 WS 5GMF Nakao], the Figures 3 show the breakdown of the end-
to-end latency in the current mobile network architecture. These figures imply that the 5G mobile
network architecture must be able to execute network functions and services at any part along the
end-to-end communication in order to make the most of wireless latency reduction (targeted from
10msec to 1msec) described in ITU-R IMT Vision [ITU-R IMT Vision].
- 78 -
TD 208 (PLEN/13)
Figure 3 End-to-End Latency Breakdown of an example mobile (LTE) network
For 3GUMTS/LTE network 3GPP had carried out latency studies which is documented in
specifications TR 25.912, TR25.913, TR36.912, TR36.913. 3GPP has carried out study for 5G
network requirements, which is documented in TR22.891. Service providers are building LTE
network to meet latency budget provided in 3GPP specification, so that services perform optimally.
Latency studies carried out on many LTE deployed network demonstrate that 3GPP specifications
provides adequate guidelines, however actual LTE network performance varies due to many variables
and adjacent ecosystem.
For IMT-2020 network our recommendation is to carry out extensive latency study and provide
guidelines for latency, packet loss and jitter etc. so that it provide optimal performance for many
diverse applications. In order to structure the latency study framework, we suggest break-down
network latency into three segments
A. Radio latency between User Equipment (UE) and base station (BS)
- 79 -
TD 208 (PLEN/13)
B. Network user-plane latency between base station, cloud-RAN, front/backhaul and mobile
gateway handling user traffic. For D2X communications user-plane latency depend upon
delay in base station
C. Network control-plane latency between base station, cloud-RAN and mobile gateways e.g.
MME handling mobility management and other control function
6.6.3 Vertical extension of slicing (Data plane enhancement)
6.6.3.1 Deep data plane programmability
In 5G mobile networks, we must support various communication protocols (such as ones being
invented) to support services such as Internet of Things (IoT) and for content delivery such as
information centric networking (ICN) and content centric networking (CCN). Advanced
infrastructure should provide capability of data-plane programmability and programming interfaces.
Although SDN community only recently started tackling the issue of data plane programmability, in
5G mobile networks, it is significant to consider the vertical extension of SDN to support data plane
programmability and programming interfaces and also of NFV to the very edge of the network closer
to UE for emerging services and applications supported by new protocols, especially for IoT services
and content delivery.
Gap analysis:
The current SDN technology primarily focuses on the programmability of the control plane, and only
recently the extension of programmability to the data plane is being discussed in the research
community and in ITU-T SG13 without well-defined use cases. For 5G mobile networking, there are
several use cases for driving invention and introduction of new protocols and architectures especially
at the edge of the network. For instance, the need for redundancy elimination and low latency access
to contents in content distribution drives ICN at mobile backhaul networks.
Protocol agnostic forwarding methods such as Protocol Oblivious Forwarding (POF) discuss the
extension to SDN addressing forwarding with new protocols. In addition, protocols requiring a large
cache storage such as ICN needs new enhancement.
A few academic research projects such as P416 and FLARE17 discuss the possibility of deeply
programmable data plane that could implement new protocols such as ICN, but there is no
standardization activity to cover such new protocols to sufficient extent.
Therefore, there exists a gap between the current projection of SDN and NFV technology
development and the requirements for deep data plane programmability. The infrastructure for 5G
mobile networks is desired to support deeper data plane programmability for defining new protocols
and mechanisms. This gap has been analyzed against what is defined in [ITU-T Y.3300].
6.6.4 Considerations for applicability of softwarization
In 5G mobile networks, not every component of infrastructure may be defined by software and made
programmable, considering the trade-off between programmability and performance. Therefore,
according to the applications and services to be enabled, it is necessary to clearly define the role of
16 Pat Bosshart, Dan Daly, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin
Vahdat, George Varghese, David Walker, “Programming Protocol-Independent Packet Processors”,
http://arxiv.org/abs/1312.1719
17 Nakao, Akihiro. "Software-defined data plane enhancing SDN and NFV." IEICE Transactions on Communications
98.1 (2015): 12-19.
- 80 -
TD 208 (PLEN/13)
hardware and software according to the possible application use cases when we softwarize the
infrastructure.
Gap analysis:
SDN and NFV are primarily motivated by OPEX and CAPEX reduction and flexible and logically
centralized control of network operations, and these technologies aim to focus on softwarization of
everything everywhere possible to meet various network management and service objectives. Also
the traffic classification is often per flow basis.
In 5G mobile networks, some applications have stringent performance requirements such as ultra-
low latency and high peak rate while others may not require cost-effective solutions. A range of
solutions exists from application driven software-based solutions executed on virtualization platform
with hypervisor, container or bare metals, to complete hardware-assisted solutions. The former may
need performance enhancement enabled by hardware-assisted solutions, while the latter may be
facilitated by software-based solutions.
The infrastructure for 5G mobile network must support traffic classification performed not only by
flow-basis but also by other metrics and bundles such as per-device and per-application basis so that
we may apply software /hardware based solutions appropriately for individual use cases. Therefore,
there exists a gap between the current projection of SDN and NFV technology development and the
requirements for applicability of softwarization. This gap has been analyzed against what is defined
in [ITU-T Y.3300].
6.6.5 End-to-end reference model for scalable operation
The softwarized networking systems should have sufficient levels of scalability in various aspects of
functions, capabilities, and components. Firstly, the target range of number of instances should be
considered, e.g. the service slices to be configured and to be in operation concurrently. The number
of clients and service providers accommodated by each service slice is also an important measure for
the practical deployment of the softwarized networking systems.
The main constraints for scalability of softwarized systems would be the dynamic behaviour of each
slice and the control granularity of physical resources. The communication session established by
mobile core, however, would be beyond the scope of this activity, because it requires a dedicated
system for such an extraordinary multiple-state and real-time control, especially for the mobility
handling. The coordination and isolation between these systems should be clearly defined.
Nevertheless, scalability for other types of sessions would be the issues of architectural modelling,
including application services, system operation, or advanced network services.
In addition to the dimensions and dynamics of the softwarized systems, investigations would be
required from the viewpoints of resiliency and inter-system coordination.
For resiliency, some new aspects might be considered other than traditional MTBF type faulty
conditions. In case of disaster, for example, the fault localization, analysis, and recovery could be
more complicated for such virtual systems with network softwarization. Miss-behaviors caused by
human factors are also difficult to cope with the traditional operation architecture, because of the
indirectness of virtual system operation.
The inter-system coordination architecture should be clearly structured and modelled for efficient
standardization and for scalability evaluation of the softwarized networking systems. There might be
two categories of the coordination, namely horizontal and vertical. The horizontal coordination is for
between slice, cloud systems, and UE, the end-to-end system coordination in other word. Two types
of vertical coordination could be distinguished. One is for slice and service provider through APIs
- 81 -
TD 208 (PLEN/13)
and another is for virtual and physical resource coordination aimed to efficient resource handling
through policy and analytics.
In summary, the softwarized network systems should have sufficient levels of scalability in the
components;
- The number of instances/service slices to be supported
- Series of capabilities provided by service slices
- The number of service sessions to be handled concurrently
- Dynamic behaviour of the instances and slices
- Granularity of resource management, especially for policy control and/or analytics
- Resiliency for various faulty conditions
- Intra-slice coordination among the end-to-end resources
- Inter-slice coordination, specifically with various external systems.
Gap analysis
Intensive studies are required on both the dimension and the dynamic behavior of softwarized
networks, since such highly virtualized systems will have an enormous number of instances and
reactions are not easy to extrapolate from the current physical systems.
The virtualized resource handling must be the essential part of the scalable and novel operation
architecture, which potentially improves conventional network operations and possibly even up to
the level of supporting disaster recovery by using softwarized network resiliency and recovery of/with
the virtualized systems both in a single domain and in multiple domains.
One of the benefits of 5G systems should be the end-to-end QoE management, however, this
capability will be established on the complex interaction between the virtualized systems including
UEs, Cloud Systems, Applications, and the softwarized network systems. The softwarized network
system itself will be composed of various virtualized subsystems. An appropriate end-to-end
reference model and architecture should be intensively investigated for such complex systems.
6.6.6 Coordinated APIs
In 5G mobile networks, it may be useful to define API so that applications and services can program
network functions directly bypassing control and management to optimize the performance, e.g., to
achieve ultra-low latency applications.
Discussions on the capabilities of the programmable interface should be objective-based, for example,
accommodating a variety of application services easily, enabling the higher velocity of service
deployment and operation, and the efficient physical resource utilization.
The users or developers who utilize the APIs could be categorized according to their roles.
Application service providers enable value added services over the end-to-end virtual connectivity
through the APIs. Advanced network service providers add some sophisticated functions to
communications sessions, such as security and reliability, in order to facilitate faster application
service deployment by the aforementioned application service providers. Network management
operators also utilize the APIs for more efficient and agile resource handling.
Information modelling should be the most significant issues for the APIs development. It should
include virtual resource characteristics, relationship between various resources, operational models,
and so on. Levels of abstraction should be carefully investigated, so that the model and APIs should
be human-readable and machine/system-implementable at higher performance simultaneously.
Since the considerations on software development methodologies would have the impact on the
model development, the choice of the proper methodology for each capability will be important.
- 82 -
TD 208 (PLEN/13)
The system control and coordination architecture is another issue for the achievement of scalable and
agile APIs. Not only the traditional provisioning/configuration or distributed control of networking
systems, automatic and autonomic system control should be the main target of these activities. The
closed loop control architecture might be the most innovative enhancement from the traditional
networking systems even for the APIs.
The robustness and fault tolerance are absolutely necessary for the open systems controlled through
the APIs by various providers. Isolation over the virtual resources should be carefully structured with
APIs’ functionalities and constraints.
In summary, discussions on the programmable interface capabilities should embrace;
- Level of abstraction sufficient both for system operations and for customization of the
capability provided by the interfaces
- Modelling for the virtual/abstracted resource in a multiple-technology environment
- Ease of programming for service and operation velocity
- Technologies for automatic and/or autonomic operations
- Provisioning of classified functional elements suitable for a range of system developers
such as supplication service providers, network service providers, and network
management operator
Gap analysis
In 5G mobile networks, it may be useful to define API so that applications and services can program
network functions directly bypassing control and management to optimize the performance, e.g., to
achieve ultra-low latency applications. Information modelling should be the most significant issues
for the APIs development. It should include virtual resource characteristics, relationship between
various resources, operational models, and so on.
Discussions on the programmable interface capabilities should include:
- Level of abstraction sufficient both for system operations and for customization of the
capability provided by the interfaces
- Modelling for the virtual/abstracted resource in a multiple-technology environment
- Ease of programming for service and operation velocity
- Technologies for automatic and/or autonomic operations
- Provisioning of classified functional elements suitable for a range of system developers such as
supplication service providers, network service providers, and network management operator
These issues should be considered as a gap to be discussed for possible standardization items.
There is also a gap for requiring a completely new API to deal with new usage of softwarized
network infrastructure such as capability exposure (refer to Clause 15).
6.7 Energy management aspects of network softwarization
Energy saving, optimization and management in the 5G networking and servicing ecosystem is an
important issue in the design of the 5G infrastructure. As performance of 5G network equipment
improves due to denser implementation a higher energy consumption would need to be avoided. 5G
Network softwarization offers the means of flexibly and efficiently changing the configuration of the
software components and network slices in a 5G systems for managing and optimizing the overall
energy consumption in a multi-domain operation. Such energy management capabilities would help
also in the use scenarios in other sectors which are using 5G systems. Network softwarization must
- 83 -
TD 208 (PLEN/13)
become a useful tool for reducing the environmental impact of other sectors and the means of
controlling and managing energy consumption in the 5G infrastructure.
Network softwarization would enable monitor, and measure energy consumption and enable
seamless, autonomic composition / decomposition of network slices, dynamic placements of network
functions and migration of groups VMs 18between servers of the same domain or across a group of
energy-conscious domains aiming to i) optimize the overall energy consumption by dynamically
changing the percentage of active versus stand-by servers/network functions and the load per active
server in a domain, and ii) stabilize the 5G system energy distribution, under peak load and increased
demand, by dynamically changing the energy consumption/production requirements of the local
domains. Autonomic composition / decomposition of network slices, dynamic placements of network
functions and moving VMs between servers in geographically distributed group domains is not trivial,
as very strict Service Level Agreements (SLAs) should be guaranteed. Moreover, changing software
components and/or containers for functions requires a significant telecommunication and energy cost,
which should be precisely calculated.
Gap analysis
Energy-conscious 5G domain: optimizing the energy consumption within the limits of a single
domain, based on system virtualization and the optimal distribution of VMs as well as M2M scenario.
This will be coupled with the dynamic adaptation of active and stand-by servers/network functions
and the load optimization per active server. A new monitoring framework to measure the energy
consumption per server module/networking component and activate low-power states on devices
would be needed.
Group of energy-conscious 5G domains: optimizing the cumulative energy consumption in a group
of domains, based on optimal distribution of VMs across all of the servers that belong in the group of
domains using policy-based methods. Measuring the energy consumption on the domain level and
deploy policies and solutions that will achieve decreased cumulative power consumption across the
whole group of domains would be needed.
6.8 Economic incentives aspects of network softwarization
The architecture design, resulting implementation and operation of 5G network softwarization are
recommended to provide a sustainable competition environment considering social and economic
issues. This includes drastic reduction of the components and systems lifecycle and operational costs
for efficient and sustainable deployment, enabling appropriate return for all actors involved in the
networking and servicing ecosystem, a reduction of barriers to entry in the 5G networking and
servicing ecosystem and solving tussles among the range of participants in the ecosystem—such as
users, various providers, governments, and IPR holders — by providing proper economic motivation.
A number of technologies have failed to flourish, or be justifiable due to inadequate or unsuitable
architecture, concerning essential economic and social aspects (i.e. including contention among
participants and/or lack of competing technologies, and/or lack of mechanisms to stimulate fair
competition)
Gap analysis
Sufficient attention needs to be paid to economic and social aspects such as economic incentives in
designing and implementing the 5G Network softwarization and its architecture in order to provide
a sustainable competition environment to the various participants.
18 Note that there exist a variety of technologies not only expressed as virtual machines (VMs) but various types of virtualization techniques such as
resource containers, host-based virtualization, and hyper-visor based virtualization, etc. to serve for the same purpose.
- 84 -
TD 208 (PLEN/13)
Drastic reduction of the operational and lifecycle costs for all components and systems involved in
the 5G network softwarization would be recommended for efficient and sustainable deployment
enabling appropriate return for all involved actors.
Ways of resolving economic conflicts including tussles in 5G networking and servicing ecosystem
that include economic reward for each participant’s contribution are becoming essential. Different
participants may pursue conflicting interests, which could lead to conflict over the overall multi-
domain operation of Network softwarization and controversy in international/domestic regulation
issues.
7 Integrated network management and orchestration
There are two aspects to consider for the integrated network management and orchestration for the
IMT-2020 network softwarization. First aspect is how to manage and orchestrate the softwarized
network components in a uniform and e2e way. The second one is how to softwarize network
management and orchestration functionality.
The former should address traditional management functionality such as fault, configuration,
performance, accounting, and security and orchestration functionality for a multiple domains, layers,
and technologies within a single slice and for a multiple slices. Especially, orchestration among
multiple slices if those slices belong to the same administration responsibility is a very challenging
problem which hasn’t been addressed up to now. ETSI NFV MANO architecture deals with
orchestration of a single slice.
The latter should address optimal methodology of softwarizing and deploying management
and orchestration functionality. The management and orchestration functionality consist of various
sub-components such manager, agent, collector, virtual analytics instrumentation, autonomic
management policy decision element, management information repository, etc. These components
can be deployed as a standalone device or virtual function embedded in a hosting server. Optimal
placement of these components is a new area to tackle with. In particular, dynamic runtime placement
of such components is possible in the softwarized network environment to achieve optimal resource
usage.
Another important issue is a multi-domain/layer/technology/slice orchestration. Within a
single slice, there can be multiple domains of VNFs ranging from mobile access, core, and SDDC.
Each domain can have one or more domain specific orchestrators. And some domain such as mobile
core can have multi-layer (e.g., packet, PTN, OTN layers) networks and multi-layer orchestrator is
required. For end-to-end orchestration, a multi-technology orchestrator that coordinates among
domain or layer specific orchestrators is required. Also multi-slice orchestration is required for
multiple slicesthat belong to the same network provider.
- 85 -
TD 208 (PLEN/13)
Figure 4 Multi-domain/layer/technology/slice Orchestration High-level Architecture
Figure 4 illustrates details of the multi-domain/layer/technology/slice orchestration. Within a single
slice, there can be multiple domains of VNFs ranging from mobile access, core, and SDDC. Each
domain can have one or more domain specific orchestrators. And some domain such as mobile core
can have multi-layer (e.g., packet, PTN, OTN layers) networks and multi-layer orchestrator is
required. For end-to-end orchestration, a multi-technology orchestrator that coordinates among
domain or layer specific orchestrators is required. Also multi-slice orchestration is required for
multiple slices which belong to the same network provider. Fig.x also shows that autonomic
knowledge plane addresses optimal orchestration policy decisions.
Gap analysis:
There are two aspects to consider for the network management and orchestration for the network
softwarization. First aspect is how to manage and orchestrate the softwarized network components.
The second one is how to softwarize network management and orchestration functionality. The
current technology gaps to be filled in are provided.
Some identified gaps which need to be filled in 5G network management are:
- Multi-technology orchestration across heterogeneous 5G multiple domains ranging from radio
access, core, to SDDC.
- Multi-slice orchestration in case that multiple slices are allocated into a single tenant and service.
- Autonomic management capability for the efficient multi-technology/domain orchestration policy
decision making.
- 86 -
TD 208 (PLEN/13)
- Optimal placement capability of virtualized management functional components in the 5G networks.
- Lightweight management and orchestration architecture to cope with performance problem and high
OPEX
- In-system management capabilities empowering the network to control complexity using
decentralization, self-organization, autonomy, and autonomicity as its basic enabling concepts. As
such the management tasks are embedded in the network and the network as a managed system now
executes management functions on its own.
- None-slio management and orchestration architecture to reduce both OPEX and CAPEX.
8 Mobile edge computing
8.1 General description
As we are approaching year 2020, new network service applications are emerging endlessly. While
they may bring to the end user amazing experiences, they also require a more efficient, personalized,
intelligent, reliable and flexible network.
Many OTT application providers have identified the demand of managing data at mobile edge which
has significant advantages. OTT application providers will be able to access to the real time network
context information so that it can timely adjust its traffic transmission. It will also benefit some OTT
applications running in the cloud with locally processing of huge amount of data at mobile edge, the
data of which is only valuable for just several seconds and which doesn’t have to be sent to the cloud.
Mobile users will be able to enjoy the personalized service with ultra low latency and higher
bandwidth.
Nowadays, operator’s key role is to maintain an efficient bearing network, which includes core
network, radio network, radio fronthaul/backhaul network and backbone network, and the investment
and maintenance of them, especially radio nodes (e.g. base stations and eNBs) and radio backhaul,
are quite costly. Handling data traffic at mobile edge with providing network context to OTT
applications will not only help operator explore new business opportunities but also can reduce radio
and mobile backhaul resource consumption.
With the demands of all stakeholders, the concept of Mobile Edge Computing is raised in the industry.
Mobile Edge Computing is an open IT service environment at a location considered to be the most
lucrative point in the mobile network, the Radio Access Network (RAN) edge, characterized by
proximity, ultra-low latency and high bandwidth. This environment will offer cloud computing
capabilities as well as exposure to real-time radio network and context information. Users of
interactive and delay-sensitive applications, which is located in proximity of the user, will benefit
from the increased responsiveness of the edge as well as from maximized speed and interactivity.
IT economies of scale can be leveraged in a way that will allow proximity, context, agility and speed
to be used for wider innovation that can be translated into unique value and revenue generation. All
players in the new value-chain will benefit from closer cooperation, while assuming complementary
and profitable roles within their respective business models.
8.2 Use cases and scenarios
Mobile Edge Computing technology enables a lot of new features in the mobile network.
- Consumer-oriented services: these are innovative services that generally benefit directly the end-
user, i.e. the user using the UE, which includes gaming, remote desktop applications, augmented and
assisted reality, cognitive assistance, etc. See 8.2.1 an example of consumer-oriented service.
- 87 -
TD 208 (PLEN/13)
- Operator and third party services: these are innovative services that take advantage of computing
and storage facilities close to the edge of the operator's network. They are usually not directly
benefiting the end-user, but can be operated in conjunction with third-party service companies, for
example: active device location tracking, big data, security, safety, enterprise services, and etc. See
8.2.2 an example of operator and third party services.
- Network performance and QoE improvements: these services are generally aimed at improving
performance of the network, either via application-specific or generic improvements. The user
experience is generally improved, but these are not new services provided to the end-user. These
include content/DNS caching, performance optimisation, video optimisation, etc. See 8.2.3 an
example of network performance and QoE improvements use case.
8.2.1 Augmented reality
Augmented reality allows users to have additional information from their environment by performing
an analysis of their surroundings, deriving the semantics of the scene, augment it with additional
knowledge provided by databases, and feed it back to the user within a very short time. Therefore, it
requires low latency and computing/storage either at the mobile edge or on the device.
In augmented reality services, UE can choose to offload part of the device computational load to a
mobile edge application running on a mobile edge platform. UE needs to be connected to an instance
of a specific application running on the mobile edge computing platform which can fulfil latency
requirements of the application, and the interaction between the user and the application needs to be
personalized, and continuity of the service needs to be maintained as the user moves around.
8.2.2 Data analytics
Some data analytic services need gathering of huge amounts of data (e.g. video, sensor information,
etc.) from devices analyzed through a certain amount of processing to extract meaningful information
before being sent towards central servers.
In order to support the constraints of the operator or the third party requesting the service, the
applications might have to be run on all requested locations, such as mobile edge servers which is
very close to the radio nodes. The application running on mobile edge server processes the
information and extracts the valuable metadata, which it sends to a central server. A subset of the data
might be stored locally for a certain period for later cross-check verification.
8.2.3 Mobile video delivery optimization using throughput guidance for TCP
Media delivery is nowadays usually done via HTTP streaming which in turn is based on the
Transmission Control Protocol (TCP). The behaviour of TCP, which assumes that network
congestion is the primary cause for packet loss and high delay, can lead to the inefficient use of a
cellular network's resources and degrade application performance and user experience. The root cause
for this inefficiency lies in the fact that TCP has difficulty adapting to rapidly varying network
conditions. In cellular networks, the bandwidth available for a TCP flow can vary by an order of
magnitude within a few seconds due to changes in the underlying radio channel conditions, caused
by the movement of devices, as well as changes in system load when other devices enter and leave
the network.
In this use case, a radio analytics Mobile edge application, which uses services of Mobile Edge
Computing, provides a suitably equipped backend video server with a near real-time indication on
the throughput estimated to be available at the radio downlink interface in the next time instant. The
video server can use this information to assist TCP congestion control decisions. With this additional
information, TCP does not need to overload the network when probing for available resources, nor
does it need to rely on heuristics to reduce its sending rate after a congestion episode.
- 88 -
TD 208 (PLEN/13)
8.3 Key challenges
Mobile Edge Computing uses a virtualisation platform for applications running at the mobile network
edge. The Mobile edge platform provides a framework for providing services to applications it hosts,
with a basic set of middleware services already defined, allowing these applications to have a rich
interaction with the underlying network environment, especially to be aware of the radio network
status so that appropriate handlings will be made to adapt to the underlying network environment. In
addition, radio analytic is exposed to applications through standardized API. See Figure 5, below for
an overview of MEC framework.
Figure 5 Overview of MEC framework
To achieve that, there are some key challenges to be considered:
8.3.1 Virtualization
Mobile Edge Computing uses a virtualisation platform for applications running at the mobile network
edge. Network Functions Virtualisation (NFV) provides a virtualisation platform to network
functions. The infrastructure that hosts their respective applications or network functions is quite
similar.
In order to allow operators to benefit to as much as possible from their investment, it would be
beneficial to reuse the infrastructure and infrastructure management of NFV to the largest extent
possible, by hosting both VNFs (Virtual Network Functions) and Mobile edge applications on the
same or similar infrastructure.
8.3.2 Mobility
Mobility is an essential component of mobile networks. Most devices connected to a mobile network
are moving around within the mobile network, especially when located at cell edge, but also when
changing RATs, etc, or during exceptional events.
Some mobile edge applications, notably in the category "consumer-oriented services", are specifically
related to the user activity. It needs to maintain some application-specific user-related information
that needs to be provided to the instance of that application running on another Mobile edge server.
Therefore service continuity should be maintained while the user is moving to an area served by
another mobile edge platform which hosts the application.
8.3.3 Simple and controllable APIs
In order to enable the development of a strong ecosystem for Mobile Edge Computing, it is very
important to develop APIs that are as simple as possible and are directly answering the needs of
- 89 -
TD 208 (PLEN/13)
applications. To the extent this is possible, Mobile Edge Computing specifications need to reuse
existing APIs that fulfil the requirements.
8.3.4 Application lifecycle management
The Mobile edge platform shall be available for the hosting of Mobile edge applications. The MEC
management functionality shall support the instantiation and termination of an application on a
Mobile edge server within the Mobile edge system when required by the operator or in response to a
request by an authorized third-party.
8.3.5 Platform service management
The Mobile edge platform provides services that can be consumed by authorized applications.
Applications should be authenticated and authorized to access the services. The services announce
their availability when they are ready to use, and mobile edge applications can discover the available
services.
8.3.6 Traffic routing
The mobile edge platform routes selected uplink and/or downlink user plane traffic between the
network and authorized applications and between authorized applications. One or more applications
might be selected for the user plane traffic to route through with a predefined order. The selection
and routing during traffic redirection are based on re-direction rules defined by the operator per
application flow. The selected authorized applications can modify and shape user plane traffic.
8.3.7 Data forwarding to edge or conventional computing server
User data needs to be categorized in two types depending on the service nature. One type is the data
which are processed in application server of data center (DC) or the cloud. Another one is the
service data which should be processed near the edge. For example, delay critical application data
or localized proximity service data should be processed in the edge network, while some other
application data are addressed to the conventional servers in DC or cloud. In order to conduct that
way systematically, an identifier presenting data types and the control entity will be required in
order to address the application data to edge network or to the conventional network.
8.3.8 Control signal transfer management
Because some type of user application data should be processed in the edge network, the service
specific control signals may need to be combined with the edge local operation, or need to be
transferred to the edge network for processing the control signals efficiently. Hence, a management
capability will be required so that the control signals are combined or transferred to the local edge
control entity for processing MEC application data.
8.3.9 Inter-edge mobility
Mobile edge service areas may consist of contiguous spots or isolated spots. A question arises how
those proximity services can be seamlessly provided even when the devices move around the local
areas across multiple edge networks. As an expected solution, such a capability will be required, that
transfers the cached service data from a source edge to a destination edge server, and the Device
Positioning Information will be useful to be shared among neighbor edge sites for tracking the mobile
device, especially in the case that pin-point serving spots are distributed. That capability may be
realized by means of some positioning systems or any spot marking assistance technologies.
Gap analysis
- 90 -
TD 208 (PLEN/13)
Support enhanced MEC management of virtualization
Mobile Edge Computing uses a virtualisation platform for applications running at the mobile network
edge. Although Mobile edge server lifecycle management supported by existing NFV-MANO, while
MEC management should support some enhancements in following aspects:
3) Mobile edge application lifecycle management: The MEC management functionality should
support the instantiation and termination of an application on a Mobile edge server within the
Mobile edge system when required by the operator or in response to a request by an authorised
third-party.
Mobile edge application service management: The Mobile edge platform provides services that can
be consumed by authorised applications. Applications should be authenticated and authorised to
access the services. The services announce their availability when they are ready to use, and mobile
edge applications can discover the available services.
Support inter-edge mobility
Mobility is an essential component of mobile networks. Considering some mobile edge applications
are specifically related to the user activity, it needs to maintain some application-specific user-related
information that needs to be provided to the instance of that application running on another Mobile
edge server. Therefore service continuity should be maintained while the user is moving to an area
served by another mobile edge platform which hosts the application. So MEC system should to
support inter-edge mobility mechanism for service continuity
Support more simple and controllable APIs
In order to enable the development of a strong ecosystem for Mobile Edge Computing, it is important
to develop APIs that are as simple as possible and are directly meeting the needs of applications. In
addition, Radio Analytics/Radio Network Information is provided through standardized API and if
there are enhancements required. MEC system should optimized existing APIs to make it more simple
and controllable.
Support traffic routing among multiple applications
The mobile edge platform routes selected uplink and/or downlink user plane traffic between the
network and authorized applications and between authorized applications. Morethan one applications
might be selected for the user plane traffic to route through properly (e.g. video optimization,
Augumented reality). The MEC system should support traffic routing mechanism among multiple
applications: selection and routing during traffic redirection based on re-direction rules which is
defined by the operator per application flow, and selected authorized applications can modify and
shape user plane traffic.
9 Distributed cloud for service providers
9.1 Introduction
Cloud computing services are typically delivered via datacenter-like infrastructure. There are
numerous types of datacenters with their respective advantages and disadvantages.
The Figure 6 depicts different types of datacenter:
- 91 -
TD 208 (PLEN/13)
Figure 6 Type of datacenter
Various 5G applications have different requirements in terms of latency, throughput, and cost.
Latency sensitive applications such as gaming, voice, video, and telepresence can benefit from the
characteristics offered by regional, metropolitan, or access clouds. In a similar fashion, best-effort
none-latency sensitive applications can profit from the cost advantage associated with national or
continent-wide datacenter solution.
We can expect that in 5G some operators will leverage the distributed nature of their communication
network by highlighting the benefits provided by regional or metropolitan clouds.19
A distributed cloud infrastructure supports the deployment and migration of applications between any
of these types of cloud infrastructure. The capability to deploy the same application in either a national
datacenter or near the network edge can bring unique advantages to operators. As example, a stock
trading application would certainly gain from much shorter latency provided by a metropolitan-area
rather than a centralized national cloud infrastructure.
A telecom cloud system management in 5G logically sits above the various types of datacenters. Such
cloud manager decides in which particular site and processor pool an application would be initiated
to fulfill the characteristics and cost defined in the Service Level Agreement associated with it.
A distributed cloud concept which encompasses processing and network resources is fundamental to
the success of IMT-2020 network.
9.2 Key characteristics
In order to facilitate management of the system, both regarding traditional, manual O&M, and
dynamic, automatic cloud orchestration as we see it in modern cloud based systems, the world of a
VM is expected to be flat. I.e., we want VMs to be seen as running on top of a vast, uniform
infrastructure where they can be moved around freely. This means that the physical infrastructure
must be abstracted so that it can be presented to the VMs this way, as exemplified in the following
Figure 7.
19 P.Suthar, M.Stolic, “Building Carrier Grade TelcoCloud“, IEEE, APWiMob,Bandung, August 2015
- 92 -
TD 208 (PLEN/13)
Figure 7 distributed cloud
The key characteristics of distributed cloud are:
On-demand self-service
A consumer can unilaterally provision capabilities, such as server time, network storage and network
bandwidth, as needed without requiring human interaction with each service’s provider.
Ubiquitous network access
Capabilities are available over the network and accessed through standard mechanisms that promote
use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Location independent resource pooling
The provider’s computing resources are pooled to serve all consumers using a multi-tenant model,
with different physical and virtual resources dynamically assigned and reassigned according to
consumer demand. The customer generally has no control or knowledge over the exact location of
the provided resources. Examples of resources include storage, processing, memory, network
bandwidth, and virtual machines.
Rapid elasticity
Capabilities can be rapidly and elastically provisioned to quickly scale up and rapidly released to
quickly scale down. To the consumer, the capabilities available for rent often appear to be infinite
and can be purchased in any quantity at any time.
Measured Service
Resource usage can be monitored, controlled, and reported providing transparency for both the
provider and user.
In addition to these characteristics, the distributed cloud provides higher resilience and availability,
greater security and the support of differentiating service classes, which will drive the deployment in
order to guarantee the described Operational Level.
Gap analysis
The existing IMT network has its limitation and lacks of flexibility and agility for deploying the
network functions and applications at any location where the performance and user experience would
be optimized. In order to meet the extremely various demands of the services in 5G, for example,
from ultra-low latency to high-latency tolerable service, distributed cloud technology provides a
viable solution. To realize its benefits, the following gaps would need to be filled: (1) Distributed
Storage Services that provide uniform, system-wide, distributed block storage for the applications
(e.g., OpenStack’s Swift and Cinder subsystems) (2) Networking Services that SDN enables such as
- 93 -
TD 208 (PLEN/13)
cloud-wide, virtualized connectivity, both at L2 and L3 levels, such as OpenStack’s Quantum, (3)
Distributed Compute Services that manage VM’s, doings tasks such as start, stop, migration and
supervisions of VMs is to be performed by a cloud computing service (e.g., CloudStack and
OpenStack’s Nova) and (4) Cloud management API for applications on top of the cloud
infrastructure (e.g., OpenStack) for application deployment, migration and portability.
Although it is ideal to have all applications running inside VM’s, reality, at least in the short term,
dictates that some tasks must continue to execute on non-virtualized or specialized hardware. In order
to limit the extra OPEX burden such system anomalies represent, it is still necessary to provide these
environments with an API that makes it possible to manage them the same way (i.e. by abstracting
and presenting a uniform interface to the applications) as is done with VM’s, so that it is still possible
to keep parts of the management APIs (loading, start, stop etc.) uniform and identical to the ones as
in VMs.
10 In-network data processing
In-network data processing is a system that provides with network wide data processing and
application services by network nodes. Increase of video traffic, the expansion of IoT, and shorter
response time requirement need a basic structural change of current ICT system configuration where
the data processing is done at the remote data center and the network just functions as a data pipe. In
5G network, it is required that the network node will provide with data processing and application
services with the aim of reducing the network congestion and also shortening response time, when
appropriate. ICN and the edge computing are typical examples. Edge computing works very well to
shorten the response time and reduce the network congestion when the target data for computing is
closed to an edge node area. In IoT, however, there are cases that the target data for processing span
to many edge node areas, therefore the inner node of a network is more appropriate for processing.
Another example can be the on-path data processing, which applies a series of data processing in
tandem manner on the transmission path, and is frequently used in big data processing. There also
exist the service provisioning cases that inner network node is better suited to perform, where the
service user is sparse and distributed to several edge nodes.
Gap analysis
One use case scenario of in-network data processing is included in ITU-T SG13 that deals with
requirements and architecture with in-network data processing. However, only a limited number of
use case scenarios are described for In Network Data Processing. Further discussion for viable in-
network data processing for 5G mobile network is necessary.
11 Resource usage optimization
A collaborative redundancy reduction methodology in an end-to-end path of softwarized network for
resource usage optimization is a new problem to tackle with.
Taking advantage of SDN control, a collaborative redundancy reduction methodology is a new
virtualized network functionality that dynamically offloads computational operations and memory
management tasks of de-duplication to the group of the software designed network virtual functions.
As this methodology efficiently chains storage de-duplication and network redundancy elimination
functions and virtualizes de-duplication processes, it achieves effective performance without
introducing high processing and memory overhead.
Gap analysis:
A large portion of digital data is transferred repeatedly across networks and duplicated in storage
systems, which costs excessive bandwidth, storage, energy, and operations. Thus, great effort has
- 94 -
TD 208 (PLEN/13)
been made in both areas of mobile and fixed networks and storage systems to mitigate the
redundancies. However, due to the lack of the coordination capabilities, expensive procedures of C-
H-I (Chunking, Hashing, and Indexing) are incurring recursively on the end-to-end path of data
processing. Redundancy reduction methodology in an end-to-end path of softwarized network may
be needed for resource usage optimization.
Some identified gaps in 5G network end-to-end path resource optimization are:
- The de-duplication ratio of the client-side data reduction technique can be inefficient due to the
limited data set and the processing cost can be too high for a client with limited capacity. Server
side data de-duplication approaches have been used in traditional storage systems, and they
mainly differ in the granularity of units for de-duplication, such as data chunks, files, hybrid, and
semantic granularity.
- Network domain data reduction techniques suffer from high processing time due to sliding
fingerprinting at the routers and high memory overhead to save packets and indexes.
- The ICN/CCN aims to reduce latency by caching data packets toward receiving clients. In
addition, ICN/CCN uses name based forwarding table that causes extra table lookup time and
raises scalability issues.
- Content Delivery Networks (CDN) can also reduce redundant data traffic by preventing a long
path to an origin server after locating files close to users.
- In summary, currently available data redundancy reduction processes are very expensive, mostly
performed by using vendor specific special purpose middleboxes or by introducing disruptive
functionality. Furthermore, the costly processes are designed and performed independently, i.e.,
redundantly.
12 Resource abstraction
As 5G services provided on a slice utilizes end-to-end resources to implement functional components,
it is necessary to define unified abstraction of resource to adopt for the best practice and performance
of network. The detailed information of the physical resource can be abstracted so that other systems,
applications, services, or users can access the capabilities of the virtual resource by using abstracted
interfaces. Therefore, it is necessary to define unified abstraction of resource to facilitate API, as
followings:
- Technology-agnostic representation of underlying physical-layer resource: The Network
Softwarization should support any existing and future technology to be compatible with each
other and can get the optimum and fair access of the underlying physical layer resources.
Hence, this will enable the network technologies-independence capability.
- End-to-end characteristics/requirements: In order to provide context-aware services with
high quality of service (QoS) for end-to-end resources, end to end QoS requirements must
be ensured for all network infrastructure i.e. WiFi, LTE, etc and wired network (including
ICN) as well.
- Granularity of slices, e.g., application session/instance granularity: The granularity of
services can be determined according to the application requirement.
- Characterization of slices: By checking available resources optimum resource allocation can
be done by the Network Softwarization and the slice fusion is supposed to be supported as
well. It is also necessary to keep end-to-end principle in each slice to balance performance
and cost of the 5G system.
In short, resource abstraction purpose is to ensure transparent network technologies and architecture
- 95 -
TD 208 (PLEN/13)
for user. In other words, this 5G resource abstraction allows end-user to handle and use underlying
resources in 5G network infrastructure easily (enable and maintain simplification for network users).
Gap analysis
This is no common model that can provide abstraction of various capabilities supported by physical
resources that constitute end-to-end scope and are not covered by existing networks, including,
physical radio interfaces, packet forwarding and routing in access networks. The granularity of
current abstraction model may not be sufficient to support various approaches to satisfy end-to-end
quality of application, while minimizing impact on utilization of networks.
13 Migration towards newly emerging networks
Implementation of network softwarization for 5G networks will co-exist with legacy network
equipment and be compatible with the existing network technologies. In other words, it should work
in a hybrid network composed of classical physical network appliances and network softwarization
appliances during the deployment phase. Therefore, the migration from the starting network to target
5G network by Network Softwarization can gradually be done by using the hybrid network
deployment, as following three-steps-migration path:
Figure 8 Draft Phased Migration
Starting network:
The starting network phase utilizes current and state-of-the-art network technologies (existing
technologies): LTE, IP-based network, etc.
Phased deployment (intermediate phase):
The benefit of this deployment is during the migration intermediate phase, all end-to-end resources
can still maintain the conventional communication means to communicate with each other. As a
result, this mechanism enables migrated end-to-end resources are deployed in conjunction with
existing devices. It enhances the migration process feasibility by enabling both the gradual 5G
deployment and maintains current communication models simultaneously during intermediate period.
The requirements for this 5g network migration are stated as followings:
The 5G network is a foundation of the future network and having a mechanism to smoothly
evolve to the future network which is under discussion in ITU-T SG13/Q15:
The migration scenario from the early stage of 5G network to the future network:
A locality based service provisioning mechanism and architecture: Mobile Edge Computing,
which is one of the hot topics of 5G mobile system discussion, and local area computing are
- 96 -
TD 208 (PLEN/13)
examples.
Possibility of the in-network data processing/service provisioning capability, where each network
node carries out some data processing and service provisioning: This feature is especially
efficient to handle IoT and big data.
Adoption of emerging network technology:
And the possible technological directions are also stated as followings.
The application of network softwarization concept as a core technology to make 5G network:
SDN and NFV are the examples.
Adoption of multiple logical networks (Slice), each having different architecture that fits to the
major services provided on the slice: IP slice, ICN slice, IoT slice, and low latency slice, etc. will
be candidates.
Having clear API for the development of a variety of applications and services developments and
their provisioning:
Moreover, it is requested that the 5G network will provide with an in-network data processing
capability, where each network node carries out some data processing and service provisioning. This
feature is especially efficient to handle IoT and big data.
Target network:
In the final phase, the target network is formed and the 5G deployment is fully achieved (the migration
process is finished), i.e. all the parts meet the requirements of network softwarization for IMT-2020
networks. Furthermore, in order to guarantee high QoS, low latency and high reliability of future
network, the 5G deployment should be based on the state-of-the-art network framework, such as ICN
which is referred as Data Aware Networking (DAN) in ITU documents (ITU-T Y.3033) and widely-
recognized for its high performance and low latency.
Gap analysis
Network virtualization described in [ITU-T Y.3011] allows the network providers to integrate legacy
support and keep backward compatibility by allocating the existing networks to LINPs (i.e., slices)
for deploying new network technologies and services or migrating to new network architecture. )
It is expected that network softwarization, especially slices can provide migration paths to newly
emerging network architecture since it may be possible to accommodate multiple network
architectures in slices concurrently. However, there is yet no activity observed for discussing the
detailed migration scenario.
14 RAN virtualization and slicing under software control
Mobile network virtualization can be also found in radio access network (RAN) as a fundamental
network domain that can be realized by network softwarization as described in the previous clause.
RAN virtualization may be found typically in a fabric of Cloud-RAN (C-RAN) structure as
described below.
The 5G mobile network needs to support flexible network capabilities with software defined radio
access technologies in terms of frequency band, transmission schemes, antenna configuration,
multiplex access attributes, for example, in order to achieve network optimization for a variety of
services in dynamic manner in various environments with a reasonable cost, In such circumstances,
a flexible programming scheme with software controlled virtualization will be required for gaining
benefits of network capabilities and performances for network operators, service providers and end
users.
- 97 -
TD 208 (PLEN/13)
Figure 9. Virtual RAN physical model - example
A physical model of Cloud-RAN is generally illustrated in Figure 9 which consists of RAN control
platform, BBU pools, Backhaul connection to Core network, Fronthaul connection to a number of
small cell sites with remote radio units (RRU). In 5G novel network, the future RAN is expected to
have an intelligent control over functions and transport networks in the cloud RAN, and some
number of small cell sites with various radio network resources which can be controlled remotely
from the central controller.
An overall picture around possible RAN virtualization is illustrated in Figure 10. It enables software
based control of data transport from user device of access network, fronthaul, backhaul to core
network.
- 98 -
TD 208 (PLEN/13)
Figure 10. RAN Virtualization model - example
Concepts of the slice and RAN domain virtualization are introduced in this Figure 16. In this
example, three slices are mapped in association with three types of service profile to achieve the
required quality and reliability by means of network key specs such as bandwidth, propagation
range, latency, mobility, UE configurations, and so on. Scope of the slicing can be extended to the
network attributes of radio stations and user terminals and the data center (DC).
RAN virtualization may own essential capabilities as follows for increasing network gain:
• RAN controller integrates overall network control, scheduling, and data transport control
throughout the user devices, remote radio unit (RRU), radio access schemes, fronthaul,
backhaul, and radio resources such as transport bandwidth, RAT attributes, signaling on BBU,
• Depending on the requirements for service application, the network slices are flexibly arranged
and scaled up or down in a configuration set with appropriate network resources, virtual
network functionalities (VNFs) in the virtual network topology in dynamic way.
• The RAN has a capability of orchestrating the VNF chain by arranging and scheduling the
virtual machines, storage memories, processing units, and so on. In consequence, all the data
processing functions like the vEPC and the transport lines become programmable in software.
• Transport SDN is also a softwarized capability for the data transport control in the path of X-
hauls through the appropriate virtual network functions on the slice per the necessary data
services and performances. The fronthaul and backhaul network path, the bandwidth, QoS,
wavelength, time-slots, etc. are controlled by the TSDN in the routing between the RRUs and
the core network.
- 99 -
TD 208 (PLEN/13)
• On each slice, the network resources are flexibly allocated in a scalable manner under the RAN
controller. Network resources are pooled, and idle resources are re-locatable among some
network slices.
As a result of the expected capabilities as above, the network can provide comfortable quality of
experience (QoE) for a variety of services in a reasonable cost (CAPEX and OPEX) with higher
flexibility and agility. However, in order to realize it, some gaps need to be studied for overcome.
Gap Analysis:
Virtualization of RAN domain in conjunction with software control is expected as effective solution
to provide appropriate QoE for diversified service requirements in dynamic way with a reasonable
cost. RAN resources and the functionalities are mapped onto the network slices in association with
the service profiles.
Following elements should be defined.
(1) Slice management and the arrangement of VNFs, virtual topology, software based transport
control on the slice.
• Control of resources mapping to slices.
• Computation of resource to slice assignments, trade-offs.
• Decision of the timing when to turn on/off a slice.
• Control of slicing within the UE, OS etc.
• Management of the end to end resources on a given slice.
• Inter-slice management (moving resources between slices)
(2) Activation of slice attributes such as the application drive, resiliency, OAM, and security on
each slice and inter-slice.
• Start/Stop/Management of applications residing within a slice.
• Resiliency of slice control
• OAM within a slice, between slices.
• Security within slice, between slices.
(3) Appropriate APIs in some network elements such as follows:
UE, Xhaul, TSDN, NVFs, Hypervisors, Switch/Routers, OTN/DWDM devices, clock
synchronization, etc.
---------------------------------------------------------------------------------
Reference documents on C-RAN
[ITU-R REP M.2320] Report ITU-R M.2320-0 (11/2014), “Future technology trends of terrestrial
IMT systems”, 5.6.4 Cloud-RAN
[NGMN] “SUGGESTIONS ON POTENTIAL SOLUTIONS TO C-RAN BY NGMN
ALLIANCE”, DATE: 03-JANUARY-2013, VERSION 4.0
[CMRI] China Mobile Research Institute, “C-RAN, The Road Towards Green RAN (Version 3.0)”,
White Paper, Version 3.0 (Dec, 2013)
[ARIB] ARIB 2020 and Beyond Ad Hoc Group White Paper, “Mobile Communications Systems
for 2020 and beyond”, Version 1.0.0, October 8, 2014, A.7.4 Cloud-RAN (C-RAN)
- 100 -
TD 208 (PLEN/13)
15 Capability exposure
Network capability exposure is for operators to provide the network capabilities needed by the 3rd
party ISP/ICP. These service providers should be able to flexibly and efficiently use the capabilities
via e.g. open API, while operators enhance the network function to provide the new capabilities.
Network operators cooperate with the 3rd party to build an ecosystem to improve user’s experience
and benefit from some new business models.
15.1 Architecture
Through the three layer architecture of network capability exposure shown in Figure 11, the
operator could offer the network capabilities to the third party users.
Figure 11. Architecture of Network Capability Exposure
Application layer: The third party platform or servers located at the highest layer are the consumers
of the network capabilities which calls the APIs provided by capability layer. These capabilities may
be to retrieve network state information, configure capability rules, apply for network control
functions, build dedicated network slices, etc.
Capability layer: This layer is located between the application layer and the infrastructure resource
layer. The primary function of this layer is to interwork with the 3rd party via open APIs to analyse
the service requirements and to enable the infrastructure resource capability to meet the specific
demand. For example, for the 3rd party with on-demand network purposes, the capability layer should
orchestrates the network resource and builds dedicated network slices. Capability layer functions
include:
- Interworking unit: The task of this unit is to receive the requirement and service information
from the third party, then offer the required network capabilities to fulfil the interaction with
the third party requirement.
- Capability enablement unit: this unit provides the map between the third party invocation
and network capabilities. In addition, it exposes the information from the under layer
network such as state data of control plane, user plane and service, value-added services,
and infrastructure resources (computing, storage and connection).Moreover, it orchestrates
the network resource according to the third party application requirement.
Infrastructure resource layer: It includes 5G network function comprising access nodes, network
Interworking
Capability Enablement
Application
Layer
Infrastructure
Layer
Capability
Layer
Open API
OTT Enterprise MVNO
Virtualized networks/platform
Physical infrastructure (network, computing and storage resources)
- 101 -
TD 208 (PLEN/13)
functions and 5G devices(presented as (smart) phones, wearables, CPEs, machine-type modules, etc.),
and the physical resources like cloud resources, network links, and etc.
Gap analysis NGMN 5G White paper has proposed the requirements on network capability exposure to enable
business agility, and envisioned 5G architecture that includes the network capability exposure as a
key functionality.
4G network architecture enhancement for capability exposure is an ongoing study in 3GPP SA2. 5G
capability exposure work is on the stage of service requirement research in 3GPP SA1. It mentions
that the network slicing capability in 5G era could be exposed to the customer by providing it the
specific network slice according to its demand. However, the detailed discussion on capability
exposure is not yet done and current use cases are not comprehensive and systematic. The existing
ITU-T specifications have covered some aspects in NGN context [ITU-T Y.2234 and Y.2240 from a
capability perspective],
The following points should be studied:
• Scenarios and requirements of network capability exposure
• Architecture, mechanism and API of capability exposure
– Overall architecture for the capability exposure
– Potential solutions and E2E procedure to enable each capability to fulfill the
specific service demand
– Open APIs interworking with 3rd party based on the investigation on API
work of this document.
– Privacy and Security
16 Identification of gaps
Please refer to Clause 7.2 of the main body of the FG-IMT-2020 report. It contains the
standardization gaps originally in this clause.
- 102 -
TD 208 (PLEN/13)
17 Supplementary material:
17.1 Satellite Networks aspects of network softwarization
Editor’s note: this material was originally in an Annex of the document produce by the softwarization
group within FG-IMT-2020.
Satellites have enabled since the beginning the extension of telecommunication services, exploiting
their main attribute: ubiquity. Depending on the condition of static or mobile for the satellite terminals
granting access to satellite telecommunication services, Fixed or Mobile Satellite Services are
defined:
• Fixed-Satellite Services (defined primarily for GEO satellites and for broadcast, telephony
and data communications) can cover large regions with limited resources and provide
telecommunication services to millions of users simultaneously (i.e. broadcast of TV programs).
• Mobile Satellite Services (for GEO, MEO and LEO satellites) have been growing as the
technology enabling their advances, and with the implications of addressing a market with strong
dominance from terrestrial Mobile Network Operators (MNOs). It is in regions with limited or no
telecommunications infrastructure (off-shore, rural environment or areas where the digital divide is
most present) where MSS target their main penetration, as well as to provide with backup for
terrestrial telecommunications networks in case of failure.
The introduction of IP into satellite networks dominates most of the functionalities and improvements
being added, the objective behind having IP flowing equally through satellite networks as it does
through terrestrial networks is clear: making of telecommunication satellites part of the existing
telecommunications infrastructure despite satellite communications’ particularities. Depending on
the satellite orbit, the distance between transmit and receive stations and the satellites ranges from
roughly 200 Km for Low Earth Orbit Satellites (LEOs), to slightly more than 35.000 Km for
Geostationary Earth Orbit Satellites (GEO). Traditionally LEO and GEO satellites have been mostly
used for telecommunication services, each with their own advantages when compared to the other:
For the provision of most services, satellite networks are always connected to an IP backbone. Even
if not integrated in terms of offering full interfacing capabilities to procure NFV and SDN, we could
say that in today’s heterogeneous telecommunications infrastructure, satellite networks already play
their role as part of the overall network infrastructure.
The main role for satellite communications can play is to extend 5G Cloud & networking services
to remote, off-shore and rural locations, in cases where telecommunications’ networks infrastructure
is scarce. Additionally, satellite communications can provide an alternative pathway for congested
terrestrial networks. With traffic set to increase monotonously throughout the foreseeable future, and
the improvements in capacity procured by new GEO satellites as well as the reduction of overall
latency brought by new satellite constellations orbiting closer to Cloud Service users makes the case
for the use of satellites as part of Could Networks infrastructure.
In addition one directional broadcast satellites could provide a way of forwarding various forms of
content to CDN/ICN nodes avoiding terrestrial networks and lessening congestion. The ability of
High Throughput Satellites to release high capacity over differentiated areas of coverage or
spotbeams independently, helps segregating the contents being delivered to diverse regions
(CDN/ICN nodes).
Gap analysis
A key challenge is to develop a pragmatic and cost efficient oriented integration of satellite with
terrestrial scenarios in the 5G networking ecosystems.
- 103 -
TD 208 (PLEN/13)
An evaluation of the benefits of gracefully integrating satellite networks and cloud networking as an
intrinsic part of the 5G ecosystem would elicit the relevant network softwarization enablers for
the use of satellites in 5G networks. The roadmap and the methods for integrating satellite in
terrestrial 5G architecture would represent an additional challenge.
17.2 Legacy Data Reduction Techniques
Editor’s note: this material was originally in an Appendix of the document produce by the
softwarization group within FG-IMT-2020.
A number of data reduction techniques have been proposed for both networks and storage domains.
Storage domain data reduction techniques are to save storage space, and run at a client’s or at a
server’s side. Client side techniques can reduce the network bandwidth by eliminating redundancy
before the data transfer.
Network domain data reduction techniques are to save bandwidth and reduce latency by
reducing repeating transfers through network links. End-to-end Redundancy Elimination (EndRE)
and WAN optimizers remove redundant network traffic at two end points (e.g., branch to head
quarter). Network Redundancy Elimination (NRE) techniques eliminate repeating network traffic
across network elements such as routers and switches. NRE computes indexes for the incoming
packet payload and eliminates redundant packets by comparing indexes with the packets saved
previously. The redundant payload is encoded by small sized shims and decoded before exiting
networks.
The ICN/CCN aims to reduce latency by caching data packets toward receiving clients. In
addition, ICN/CCN uses name based forwarding table that causes extra table lookup time and raises
scalability issues. Meanwhile, Content Delivery Networks (CDN) can also reduce redundant data
traffic by preventing a long path to an origin server after locating files close to users. Fig.x shows the
various efforts of resource optimization by eliminating redundancies in specific ways.
Fig.x. Legacy Redundancy Elimination Techniques
17.3 Standardization efforts in mobile edge computing
- 104 -
TD 208 (PLEN/13)
Editor’s note: this material was originally in an Appendix of the document produce by the
softwarization group within FG-IMT-2020.
17.3.1 Standardization efforts in the industry
The concept of Mobile Edge Computing has now been widely accepted in the industry and is
implemented with many reference cases around the globe. Therefore, there’s great need of
standardization efforts to enable application portability and good performance in multi-vendor
environment.
On September 24th 2014, a new multi-stakeholder industry initiative on Mobile-edge Computing
(MEC) was formed under the auspices of an ETSI Industry Specification Group (ISG).
The purpose of the ISG MEC is to produce (Standards Track Deliverables) interoperable and
deployable Group Specifications that will allow the hosting of third-party applications in a multi-
vendor Mobile-edge Computing environment. The deliverables of ISG MEC include:
- an ontology containing the terminology that will be used consistently by the set of MEC
specifications (informational)
- a gap analysis, identifying critical functional elements and techniques that need to be
standardized to provide greater value (informational);
- Requirements (normative);
- Framework and reference architecture (normative);
- Specifications relating to the platform services and the APIs (normative).
In February 2015, 3GPP kicked off Feasibility Study on New Services and Markets Technology
(SMARTER), the objective of which is to develop 5G technical requirements specification. Until
SA#69 plenary meeting, there are 49 use cases defined, many of which are MEC relevant, such as
Tactile Internet, Extreme real-time communications and the tactile internet, Improvement of network
capabilities for vehicular case, Connected vehicles, Routing path optimization when server changes,
etc.
In September 2015, 3GPP SA#69 has agreed that SA WG2, being responsible of developing 3GPP
architecture standard, were asked to provide a proposed study item to TSG SA#70 (December 2015)
on Next Generation Mobile Radio Technology. Requirements identified by SA1 SMARTER and
other operator pain points will be addressed in the SA2 study item, and it can be speculated that MEC
will be one important feature of it.
17.4 Supplemental figures on network softwarization
Editor’s note: this material was originally in an Appendix of the document produce by the
softwarization group within FG-IMT-2020.
17.4.1 IoT services
- 105 -
TD 208 (PLEN/13)
Figure III-1 A use case of using the architecture to implement IoT services
17.4.2 Transport service
- 106 -
TD 208 (PLEN/13)
Figure III-2 A use case of using the architecture to implement transport services
Figure III-2 shows a use case of using the Figure 2 to implement transport services. The large part of
the middle area represents the virtualised network platform that is the target of network softwarization
in this use case.
The software platform consists of multiple slices on which a Slice-Control entity exists to conduct
programming for the service specific control on each slice with the possible individual domain
orchestrations. On each slice, virtualized network functions (VNFs) are placed appropriately in those
virtual networks of RAN, Edge network and Core network throughout the end-to-end path to connect
the user device to service cloud, while the data transport control is conducted.
These network blocks do not include application layer’s function within them, but can drive or be
driven by the upper layered application functions via API. And, the application data are carried
through the logical transport path mapped logically on the slice network under the data forwarding
control.
Those slice-controllers under individual domain are totally organized in end-to-end by the multi-
domain orchestration which coordinates the inter-slice management, the life cycle management and
the resource management.
17.4.3 Detailed functional architecture
Figure IV-3 describe a detailed functional architecture.
Figure III-3 Detailed functional architecture
Service-specific control for each application service are allocated on each slice. Different application
services may have different control requirements which request different types of functions and
- 107 -
TD 208 (PLEN/13)
resources (physical and virtual) and topologies to be instantiated and different configurations to be
maintained during their life time.
Inter-slice control coordinates service-specific controls for slices, and manages a common control
functions in the Management and Orchestration block. It interfaces with service-specific controls to
perform life cycle management and resource management of slices.
Note that while a service specific control may track authentication of its service application, there
may be a case where a physical device be tracked by the management and orchestration block in some
way. This is because a device may be connected to multiple slices simultaneously. Also note that
server-side functions may be located on the infrastructure provided by other parties.
Management and Orchestration block is responsible for life cycle management of slices. It performs
placement and instantiation of network functions. Furthermore, it performs association to the function
on user devices and server-side functions.
At the time when a service-specific slice are to be created, requests may be generated by the service-
specific control indicating what network functions are needed (e.g. any MTC service, CDN service,
Public Safety) and what type of devices & applications (e.g. Video, Device data /Real-time or not)
are used in their locations.
Management and Orchestration block is responsible for resource management of infrastructure. It
manages the allocation of network functions and virtual networks which are used by slices. It examine
the requests and determine the resources to be allocated, then it instantiates the network functions and
virtual networks on the slice on associated physical infrastructure.
Figure III-4 A use case of the functional architecture to implement IoT services
- 108 -
TD 208 (PLEN/13)
Figure III-5 A use case of the functional architecture to implement transport services
Figure IV-5 shows a functional model and the end-to-end signal/data flow of 5G mobile network.
The multi-domain orchestration consolidates the domain specific orchestration operations in network-
wide, and that conducts total managements of Inter-slice, Slice life cycle, and Resource management
over the multi-network domains in end-to-end.
On the other hand, the domain specific orchestration may exist individually under each network
provider and plays a role of virtual network organization on each network administrative domain. On
each slice, the slice encompasses capabilities of logical transport network control and virtual network
functionalities (VNFs), and the virtual transport paths are mapped on the sliced network topologies.
18 Acknowledgement
This work was partially supported by the European Union 7th Framework Program DOLFIN
project (“Data centres optimization for energy-efficient and environmentally friendly internet”;
http://www.dolfin-fp7.eu), the EU H2020 5G PPP projects: 5GEX (“5G Multi-Domain Exchange”;
https://5g-ppp.eu/5GEx) and SONATA (“Service Programing and Orchestration for Virtualized
Software Networks”; https://5g-ppp.eu/sonata/) and the European Space Agency (ESA) INSTINCT
project (“Scenarios for integration of satellite components in future networks”;
https://artes.esa.int/projects/instinct).
Contributors (in Alphabetical Order)
- 109 -
TD 208 (PLEN/13)
This is the list of all contributors who submitted any written form of comments or contributions.
– Hui CAI, China Mobile
– Wei CHEN, China Mobile
– Taesang CHOI, ETRI
– Ken FUJIMOTO, Huawei Technologies Japan
– Alex GALIS, University College London
– Sherry SHEN, Nokia Networks
– Marc MOSKO, PARC
– Akihiro NAKAO, University of Tokyo
– Takashi SHIMIZU, NTT
– Xiaowen SUN, China-Mobile
– Prakash SUTHAR, Cisco Systems
– Toshiaki SUZUKI, Hitachi
– Akihiko TAKASE, Hitachi
– Toshitaka TSUDA, Waseda University
– Jian WANG, Ericsson
– Weixin WANG, Nokia Networks
- 110 -
TD 208 (PLEN/13)
Appendix III
End-to-end QoS
Editor’s Note: Appendix III was produced during the FG-IMT 2020 focus group in order to
investigate gaps in standardization related to IMT-2020. While the request from SG-13 was to
deliver a report outlining standardization gaps, the consensus of the focus group was that the
working documents produced and used during the focus group work contained useful information
for future work and should be captured. Note, however, the focus group concentrated on producing
accurate descriptions of the standardization gaps in the main body of this document; some minor
errors may exist in the appendices. They are, however, the output of the focus group but are
provided for information only.
Editor’s Note: This appendix uses clause references in a form usually associated for normative text.
This is maintained for this report to align with references made in the main body of this report.
This baseline document for a QoS framework for IMT-2020 is revised on related input documents,
as well as discussions, feedback and suggestions received at the break-out session on QoS on the last
Torino meeting.
The revision is as follows:
- Addition of section 2, references
- Two editor’s notes in relation to new parameters and measurement & monitoring
- Some minor editorial corrections
======================
- 111 -
TD 208 (PLEN/13)
QoS framework for IMT-2020
Summary
This deliverable:
- provides concepts and descriptions of Network Performance, Quality of Service and
Quality of Experience
- illustrates how the concepts are applied in IMT-2020, including the relationship between
concepts
- indicates and classifies concerns for which reference model and parameters can be needed
- identifies generic guidance of performance parameters, QoS classes and its allocation
Editor’s Note: Depending on the developed contents of work items in the focus group (e.g., High-
level Architecture, Network Softwarization and Use Case), this document may need to be revised.
Keywords
IMT-2020, Fixed Network, Wireless Network, Network Performance, Quality of Service, Quality
of Experience, QoS parameters, QoS classes
1 Scope
This document introduces the high-level end-to-end QoS/QoE requirements of IMT-2020. Basic
terminologies and concepts are defined and attributes are developed independent of the underlying
technology. With a view to facilitating future enhancements, the main body of the
document describes the topic in general. It is noted that the descriptions of QoS in the document are
designed to identify the customer’s QoS/QoE requirements for various use cases and
applications in IMT-2020, and the QoS requirements for service providers to offer could be derived
accordingly. Consequently, future studies will be able to determine network technologies and
architectures that can efficiently achieve the desired QoS/QoE requirements in IMT-2020.
The objective of this document is to describe the following:
Overview of expected study areas, categorization, and definition of terminologies
Gap analysis of activities of ITU and other organizations relevant to QoS/QoE of IMT-2020
Reference models and performance parameters
General guidance of performance parameters, QoS classes and their allocation
Issues and items that need to be addressed by standards supporting IMT-2020
2 References
The following ITU-T Recommendations and other references contain provisions which
through reference in this text, constitute provisions of this Recommendation. At the time of
- 112 -
TD 208 (PLEN/13)
publication, the editions indicated were valid. All Recommendations and other references
are subject to revision; users of this Recommendation are therefore encouraged to
investigate the possibility of applying the most recent edition of the Recommendations and
other references listed below. A list of the currently valid ITU-T Recommendations is
regularly published.
The reference to a document within this Recommendation does not give it, as a stand-alone
document, the status of a Recommendation.
[ITU-T Y.1540] Recommendation (2011) - Internet protocol data communication service -
IP packet transfer and availability performance parameter - http://www.itu.int/rec/T-REC-
Y.1540-201103-I/en;
[ITU-T Y.1541] Recommendation (2011) - Network performance objectives for IP-based
services - http://www.itu.int/rec/T-REC-Y.1541-201112-I/en;
[ITU-T Y.1542] Recommendation (2010) - Framework for achieving end-to-end IP
performance objectives - http://www.itu.int/rec/T-REC-Y.1542-201006-I/en;
[ITU-T G.1000] Recommendation (2001) - Communications Quality of Service: A
framework and definitions - http://www.itu.int/rec/T-REC-G.1000-200111-I/en
[ITU-T G.1010] Recommendation (2001) - End-user multimedia QoS categories -
http://www.itu.int/rec/T-REC-G.1010-200111-I/en;
[3GPP TS 23.107] Technical Specification (2014) - Quality of Service (QoS) concept and
architecture - http://www.3gpp.org/ftp/specs/archive/23_series/23.107/
[3GPP TS 23.401] Technical Specification (2015) - General Packet Radio Service (GPRS)
enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access
- http://www.3gpp.org/ftp/specs/archive/23_series/23.401/
3 Terms and Definitions
For further study
4 Abbreviations and acronyms
This deliverables defines the following abbreviations:
GBR Guaranteed Bit Rate
GW Gateway
IMT International Mobile Telecommunications
IP Internet Protocol
IPDV IP packet Delay Variation
IPER IP packet Error Rate
IPLR IP packet Error Ratio
IPTD IP packet Transfer Delay
MBR Maximum guaranteed Bit Rate
- 113 -
TD 208 (PLEN/13)
NP Network Performance
O&M Operation and Maintenance
QCI QoS Class Identifier
QoE Quality of Experience
QoS Quality of Service
5 Review of perspectives and standards on IMT-2020
5.1 Survey of Whitepapers
The first step in establishing a common QoS framework would be to identify the current
status of QoS-related views and descriptions in relevant studies and white papers. This
section therefore provides a survey on IMT-2020 QoS-related studies and white papers of
the following organizations:
- International Organizations: NGMN, GSMA
- Regional Organizations: Horizon 2020, NetWorld2020, RAS Future Networks Cluster,
4G Americas
- Local Organizations: ARIB, Future Mobile Communication Forum of China, IMT-2020
Promotion Group, Huawei, ZTE, Nokia, Qualcomm, Ericsson, Samsung, NTT DoCoMo,
Datang Telecom Technology & Industry Group
Type Name Views
International NGMN - Definition: No formal definition
- General Requirement Description: Ability to enhance user experience
and to provide differentiated and/or guaranteed QoS.
- Parameters: User experienced data rate, latency, mobility, connection
density, traffic density, coverage, signalling efficiency
- Performance Objectives: 1Gb/s, 1~10ms, 500km/hr, 250k/km2,
100Gbps/km2, none, none
GSMA - Definition: No formal definition
- General Requirement Description: Ability to maintain customer
experience at peak data and to enhance quality of data roaming.
- Parameters: Data rate, latency, bandwidth per unit area, number of
connections, perception of availability, perception of coverage
- Performance Objectives: 1-10Gbps, <1ms, 1000x LTE, 10-100x LTE,
99.999%, 100%
Regional Horizon 2020 - Definition: No formal definition
- General Requirement Description: Ability to provide differentiated
and/or guaranteed QoS.
- Parameters: Throughput, handover reliability, call drop rate, data
access and discovery, signalling and traffic overhead
- Performance Objectives: None
NetWorld2020 - Definition (QoE): The degree of delight or annoyance of the user of
an application or service.
- General Requirement Description: Ability to optimize user QoE
experience and to provide differentiated and/or guaranteed QoS.
- 114 -
TD 208 (PLEN/13)
- Parameters: Bandwidth, delay, jitter
- Performance Objectives: None
RAS Future
Networks
Cluster
- Definition: No formal definition
- General Requirement Description: Ability to provide differentiated
and/or guaranteed QoS.
- Parameters: Data rates, delay
- Performance Objectives: 1000x LTE (100Gb/s per site), none
4G Americas - Definition: No formal definition
- General Requirement Description: Ability to deliver the best QoS
- Parameters: Data rate, latency, mobility, capacity, coverage
- Performance Objectives: 100x, 5x~10x reduction, none, none, none
Local ARIB - Definition: No formal definition
- General Requirement Description: Ability to maximize user
perception with limited network resources.
- Parameters: Peak data rate, capacity density, number of connected
devices/cell, latency, mobility, reliability
- Performance Objectives: >10Gbps, 1,000x IMT-Advanced,
>10,000/cell, <1ms, >500km/hr, 90%~99.999%
Future Mobile
Communication
Forum of China
- Definition: No formal definition
- General Requirement Description: Ability to provide consistent user
QoE.
- Parameters: Peak data rate, guaranteed user data rate, connection
density, traffic density, latency, mobility
- Performance Objectives: >10Gbps, >100Mbps, >1M/km2,
>10Tbps/km2, <1ms (radio) <10ms (E2E), up to 500km/hr
IMT-2020
Promotion
Group
- Definition: No formal definition
- General Requirement Description: Ability to provide gigabit user
experienced data rate and to satisfy QoS requirements of different
application scenarios
- Parameters: User experienced data rate, peak data rate, traffic density,
connection density, latency, reliability
- Performance Objectives: 100Mbps~1Gbps, >10Gbps, .10Tbps/km2,
1M/km2, <1ms, 100%
Huawei - Definition: No formal definition
- General Requirement Description: Ability to resolve complex and
different performance requirements by wide range of mobile services.
- Parameters: Latency, simultaneous connections, data rate, switching
time
- Performance Objectives: <1ms, hundreds of billions of machines,
1Gb/s~10Gb/s, <10ms
ZTE - Definition: No formal definition
- General Requirement Description: Ability to provide consistent on-
demand access to services and to provide differentiated QoS.
- Parameters: Capacity, peak data rate, latency, accuracy
- Performance Objectives: None
Nokia - Definition: No formal definition
- General Requirement Description: Ability to provide a virtual zero
latency gigabit experience
- Parameters: Capacity, latency, user data rates, coverage
- 115 -
TD 208 (PLEN/13)
- Performance Objectives: 10,000x than LTE, <1ms, >10Gb/s, none
Qualcomm - Definition: No formal definition
- General Requirement Description: Ability to enhance user experience
and to provide differentiated and/or guaranteed QoS.
- Parameters: Latency, reliability, coverage
- Performance Objectives: None
Ericsson - Definition: No formal definition
- General Requirement Description: Ability to deliver high-quality
connectivity with very high availability.
- Parameters: Capacity, data rate, latency, reliability, availability
- Performance Objectives: None
Samsung - Definition: No formal definition
- General Requirement Description: Ability to deliver uniform end-to-
end experience regardless of user-location.
- Parameters: Latency, peak data rate, cell edge data rate, mobility,
simultaneous connections
- Performance Objectives: <1ms, >10Gbps, >1Gbps, >500km/hr,
>1M/km2
NTT DoCoMo - Definition: No formal definition
- General Requirement Description: Ability to provide more uniform
user QoE than LTE
- Parameters: Capacity, RAN latency, user throughput
- Performance Objectives: 1000x compared to LTE, <1ms, 1Gbps
everywhere
Datang Telecom - Definition: No formal definition
- General Requirement Description: Ability to provide reliable
performance.
- Parameters: Peak data rate, latency, user throughput, throughput/km2,
connections/km2, mobility
- Performance Objectives: 10Gbps, <1ms, >10Mbps, >100Gbps/km2,
>1M/km2, 1,200 km/hr
While most of the organizations agree that IMT-2020 network should provide both
consistent user experience and differentiated/guaranteed QoS, the organizations differ in the
specific aspects of network to be managed and therefore have different definitions of QoS.
For example, some emphasize user experienced data rate and suggest monitoring of the
parameter along with peak data rate. Nevertheless, some parameters (e.g., latency and
mobility) are commonly proposed by the organizations and they may be able to provide a
common ground for end-to-end QoS framework.
An important issue is that the views on IMT-2020 mostly focus on the Quality of
Experience/Service at RAN (Radio Access Network), and seldom do organizations take into
account end-to-end QoS (including RAN & Fixed Network). It is true that organizations
such as Samsung and NGMN have acknowledged the importance of end-to-end latency in
5G network. However, most of the organizations suggest monitoring of user plane latency
instead, and it is difficult to provide consistent QoS in this perspective.
- 116 -
TD 208 (PLEN/13)
5.2 Gap Analysis of Standards on IMT-2020
As noted in the previous section, current IMT-2020 QoS-related studies and views differ and
are usually limited to RAN (Radio Access Network). While the need for standardization of
single common end-to-end QoS is evident, the existing standards must be carefully studied
in advance to identify topics for in-depth study. In this context, this section aims to provide a
gap analysis20 of representative QoS standards of 3GPP and ITU-T.
Before proceeding to gap analysis, some major terms must be defined to avoid confusion.
3GPP simply defines a concept of bearer, a link between two end-points defined by a certain
set of characteristics, to implement QoS. ITU-T, on the other hand, distinguishes NP
(Network Performance) from QoS to translate user demands to network operational
attributes. While QoS is defined to be “collective effect of service performances which
determine the degree of satisfaction of a user of the service,” NP is defined independently of
terminal performance and user actions to provide information for system development,
network planning, and O&M (operation and maintenance). In other words, QoS views the
“quality” of network in the user’s perspective and the other two (bearer and NP) views the
same concept in network providers’ perspective. This document will follow the definitions
as provided by 3GPP and ITU-T.
5.2.1 Definition of “End-to-End” in different standards
3GPP’s concept of “end-to-end” comprehensively covers the whole network from a user’s
device to another user’s device. However, its UMTS bearer concept is limited to an interval
starting from user’s device to PDN gateway (a gateway in wireless core network) for the
sake of practicality (i.e., a network operator can influence only its network and its radio
interface). (3GPP TS 23.107, TS 23.401 Rel.12)
ITU-T, on the other hand, attempts to identify network QoS from end user to end user by
defining UNI (User Network Interface) to UNI objectives in Y.1541. The concept, however,
is usually applied to wireline IP-based services without any specific discretion on
technologies of lower layers.
Figure 1. The scope of 3GPP (Red) and ITU-T Standards (Purple)
5.2.2 Layered Approach for QoS Management
The all-IP nature of IMT-2020 network allows data to be transported without connection on
IP layer. With a given pair of source and destination IP address, IP packets are transferred
from an end to another. The performance of an IP service, however, also depends on the
performance of other layers (both upper and lower layers) and it is important to
identify/acknowledge the relationship between performances of different layers.
20 IMT-2020 network is predicted to be all-IP environment and it will be sufficient to compare standards covering QoS
of IP networks as a preliminary step
- 117 -
TD 208 (PLEN/13)
ITU-T’s Y.1540 standard provides a layered model of performance of IP service to illustrate
the point aforementioned. The lower layers do not have end-to-end significance (i.e., it
transfers packet from a point to another) but the type of technology employed (e.g.,
Ethernet-based leased lines) may affect the performance. Higher layers may also affect
performance. 3GPP’s bearer acknowledges the effect of various layers on IP services, but
defines the bearer on layer 1 and 2 for the use of higher layers (3GPP TS 23.107 & 23.401).
Nevertheless, both acknowledge that the framework must take into account the impact from
performance of layer 1 and 2 in both wireline and wireless media.
5.2.3 QoS Classification
Not only is the scope of the standards different, but also classification of QoS. 3GPP (TS
23.107, 23.203, 23.401) classifies QoS bearer using QCI (QoS class identifier) and ARP
(Allocation and Retention Priority). QCIs provide the thresholds of basic parameters such as
packet delay and packet error loss rate, while ARP provides the basis for establishing
different bearers in the face of resource limitations (i.e., it prioritizes the allocation and
retention of bearers not packets). The bearers are provided as either GBR (bearer with the
minimum guaranteed bit rate per bearer) or MBR (the maximum guaranteed bit rate per EPS
bearer). In other words, some applications (mission critical applications such as
conversational voice and conversational video) are to be provided via GBR bearer and other
applications are to be provided via MBR bearer.
ITU-T, on the other hand, specifies six classes (one of whose parameters are unspecified) of
QoS to differentiate and guarantee traffic quality. While the details of classification is
different, 3GPP’s basic philosophy of differentiating mission-critical class traffic from
default best-effort traffic is also inherent in ITU-T’s QoS classification.
QCI Type Packet Delay
(ms)
Packet Error
Loss Rate Example Services
1
GBR
100 10-2 Conversational Voice
2 150 10-3 Conversational Video (Live Streaming)
3 50 10-3 Real Time Gaming
4 300 10-6 Non-Conversational Video (Buffered Streaming)
65 75 10-2 Mission Critical user plane Push To Talk voice
66 100 10-2 Non-Mission-Critical user plane Push To Talk Voice
5
MBR
100 10-6 IMS Signalling
6 300 10-6 Video (Buffered Streaming), TCP-based services
7 100 10-3 Voice, Video (Live Streaming), Interactive Gaming
8 300 10-6 Video (Buffered Streaming), TCP-based services
9 300 10-6 Video (Buffered Streaming), TCP-based services
69 60 10-6 Mission Critical delay sensitive signalling
70 200 10-6 Mission Critical Data
Table 1. 3GPP’s QoS Classification (QCI only)
QoS Class IPTD IPDV IPLR IPER
0 100ms 50ms 10-3 10-4
1 400ms 50ms 10-3 10-4
2 100ms - 10-3 10-4
3 400ms - 10-3 10-4
4 1s - 10-3 10-4
5 (Unspecified) - - - -
Table 2. ITU-T’s QoS Classification (QoS Class)
- 118 -
TD 208 (PLEN/13)
5.3 Rationale for a common QoS framework for IMT-2020
The differing and RAN-centric view of IMT-2020 QoS calls for a systematic and integrated
approach to establish a common framework for end-to-end QoS. Since the content of the
existing standards are not sufficient, this document aims to provide a common single end-to-
end standard.
6 Network performance, Quality of Service and Quality of Experience
QoS is defined in Recommendation E.800 as follows: “Collective effect of service performance
which determine the degree of satisfaction of a user of the service”.
The definition of QoS in Recommendation E.800 is comprehensive and encompasses many
areas of work, including subjective user satisfaction. However, within this document the
aspects of QoS that are covered are restricted to the identification of parameters that can be
directly observed and measured at the point at which the service is accessed by the user.
Recommendation I.350 defines Network Performance as follows: “NP is measured in terms of
parameters which are meaningful to the network provider and are used for the purpose of
system design, configuration, operation and maintenance. NP is defined independently of
terminal performance and user actions.”
QoE is defined as the overall acceptability of an application or service, as perceived
subjectively by the end-user. Quality of Experience includes the complete end-to-end system
effects. Overall acceptability should be influenced by user expectations and context.
Figure 1 illustrates how the concepts of QoS, NP and QoE can be applied in IMT-2020.
- ESP: End-Service Platform (i.e., Mobile/smart phone, data server, appliances, TV, etc.)
Figure 2. General reference configuration for QoS, NP and QoE
Editor’s Note 1: User-to-user communication is the basic consideration in this figure. In order to cover
the IMT-2020 in broader perspective, the connectivity of IMT-2020 should facilitate Machine-to-
machine/Device-to-device interfaces as well. This is for further study.
Editor’s Note 2: The above definitions and configuration are derived from existing general
telecommunication terminologies. Based on the study result of new architecture for IMT-2020, those
definitions and configuration (i.e., the coverage or location of wireless interface) may be changed. This
is for further study.
Human-
Machine
Interface
Human-
Machine
Interface
Network
Interface
Network
Interface
Network Performance for IMT-2020
Quality of Service for IMT-2020 QoE QoE
User User E-SP E-SP Core Network Access
Network
Access
Network
- 119 -
TD 208 (PLEN/13)
QoS, NP and QoE are related concepts with different focus and scope.
QoS provides a valuable framework for network provider, but it is not necessarily usable in
specifying performance requirements for particular network technologies (i.e. ATM, IP,
MPLS, etc.). Similarly, NP ultimately determines the (user observed) QoS, but it does not
necessarily describe that quality in a way that is meaningful to users.
QoE is subjective in nature, i.e. depend upon user actions and subjective opinions.
The definition of QoS, NP and QoE should make mapping clear in cases where there is not a
simple one-to-one relationship among them.
Table 1 shows some of the characteristics which distinguish QoS, NP and QoE.
Table 3. Distinction between quality of experience, quality of service and network
performance
Quality of Experience Quality of Service Network Performance
User oriented Provider oriented
User behaviour attribute Service attribute Connection/Flow element attribute
Focus on user-expected
effects
Focus on user-
observable effects
Focus on planning, development
(design), operations and
maintenance
User subject Between (at) service
access points
End-to-end or network elements
capabilities
The separation of QoS, NP and QoE indicates that development of corresponding parameters
should take into account the following general points:
- the definition of QoS parameters should be clearly based on events and states observable
at service access points and independent of the network processes and events which
support the service;
- the definition of NP parameters should be clearly based on events and states observable
at network element boundaries, e.g. protocol specific interface;
- the definition of QoE parameters is for further study.
7 Top down perspective of QoS
Applying QoS in the field usually takes four steps, which is well illustrated and recommended by
Figure 1 of ITU-T Recommendation G.1000 as follows:
① Customer’s QoS requirements: This is a perspective focusing on the resulting end-to-end
service quality. The customer is not concerned with how a particular service provided or
with any aspects of the telecommunication network’s internal design and operation.
② Service provider’s offerings of QoS (or planned/targeted QoS): This is the level of quality
expected to be offered to the customer by the service provider. It is expressed by values
assigned to QoS parameters and examples include SLA (Service Level Agreements).
- 120 -
TD 208 (PLEN/13)
③ QoS achieved or delivered: This is the quality actually achieved and delivered to the
customer. This is expressed by values assigned to parameters so that it can be compared to
the offered QoS.
④ Customer survey ratings of QoS: This is the level of quality that customers believe they
have experienced. It is usually expressed in terms of degrees of satisfaction rather than
technical terms. These survey ratings are then reflected in the customer’s QoS requirements
and other viewpoints will be revised accordingly.
Figure 3/G.1000(Figure 2). The four viewpoints of QoS
Among the four viewpoints, the scope of this focus group will mainly focus on the first perspective
of top down approach: defining customer’s QoE requirement for IMT-2020. While the second to
fourth steps are essential for building the QoS framework, they are not necessarily included in the
scope of this focus group. This is because the three steps are dependent on protocols and/or
technologies used in the telecommunication network, and these issues may be resolved by further
study in corresponding study groups.
8 Reference model of Connectivity
Variations in connectivity configurations and diversity of use cases make development of a single
universal figure for end-to-end IMT-2020 connectivity impossible. Since prospective IMT-2020
applications and legacy telecommunication services have to cover short-range communication and
inter-continental communication, various connectivity configurations should be considered. For
example, the longest connectivity will have length of 27,500km (half of the equatorial
circumference of the Earth, ITU-T Recommendation G.801) while V2V (Vehicle-to-vehicle)
communication can take place in the connectivity of less than10m.
The following figure presents a general reference configuration for the connectivity of IMT-2020.
The connectivity may be delivered via both wireless and wireline media.
- 121 -
TD 208 (PLEN/13)
- E-SP: End-Service Platform (i.e., Mobile/smart phone, data server, appliances, TV, etc.)
Figure 4. General reference configuration for the connectivity of IMT-2020
Editor’s Note: The above definitions and configuration are derived from existing general
telecommunication terminologies. Based on the study result of new architecture for IMT-2020, those
definitions and configuration (i.e., the coverage or location of wireless interface) may be changed.
Various connectivity configurations that can be considered are illustrated in figure 2 (listed in
descending order of physical distance):
① International (including inter-continental) inter-operator communication
② Intra-national inter-operator communication
③ Intra-operator communication
④ Device-to-Network communication
⑤ D2D (device-to-device) communication
* Note: configurations #1 ~ #3 each consist of wireless-wireline, wireline-wireline, and wireless-
wireless communications, but figure 5 shows only wireless-wireline communication for simplicity
While the first three connectivity cases are already utilized by the legacy telecom service, IMT-
2020 specific connectivity (i.e., case #4&5) may not fully supported by legacy connectivity and this
calls for a new approach. Traditional SDOs (ITU, 3GPP, etc.) have already defined QoS
requirements of the first three connectivity cases excellently and relatively minor modifications will
be necessary for them to be applied to IMT-2020. However, IMT-2020 specific connectivity (such
as case #4&5) is not covered by existing standards and a new QoS framework to address the case is
necessary.
Human-
Machine
Interface
Human-
Machine
Interface
Network
Interface
Network
Interface
Connectivity between multi-operators
User User E-SP E-SP Operator N Operator 1 Operator 2 …….
- 122 -
TD 208 (PLEN/13)
Figure 5. Various configurations of connectivity
The diversity of configurations suggests that high-level end-to-end QoE requirement for IMT-2020
needs to consider the distance and the complexity (i.e., number of telecommunication systems) of
the configuration in concern. Therefore, the standard should define allocation rules based on longest
reference case of connectivity and requirements for specific use cases based on shorter reference
case of connectivity.
9 Layered model of performance
For operators to realize the customer QoE requirements in IMT-2020 network, QoS engineering is
required for different network technologies and protocols.
While this document focuses on the concept of connectivity, which is independent of underlying
technologies/protocols, it is nevertheless necessary to consider their effects in different layers. As
an example, the delay perceived by user may consist of delays from the processing in application
layer, the transfer of packets in IP layer, the overhead of interworking different protocols in the data
link layer, and the delays in traveling from one source to another via a physical medium. For
example, a VoIP call may have total accumulated delay of 100ms that consists of the following
delays: 40ms processing delay in user handset, 50ms delay due to routing and 10ms propagation
delay over fibre optic links.
Also, having different media/protocol in the same layer affects the performance. For example, the
distance and the complexity of connectivity must be taken into account to define delay-related
- 123 -
TD 208 (PLEN/13)
requirements. If end-to-end connectivity with delay of less than 10ms is necessary, the connectivity
should be designed within 1,600km of fibre optic links (because fibre optic link will have a
propagation delay of 6.25μs/km as defined in ITU-T Recommendation I.356). Then the processing
and queueing delays in a network system (i.e., router, switch, etc.) should be considered. If a
network system issues 2ms delay for internal processing and queueing and 3 network systems are
required in the connectivity, the distance of the link must be reduced accordingly into 640 km. If
servers for specific services are required in the connectivity, these factors should be taken into
account as well. Furthermore, if wireless links are employed in this connectivity, the connectivity
must be engineered to suit the protocols and the technologies of wireless links.
In other words, realizing customer’s QoE requirements must be based on the structure of
technologies and protocols in different layers. This is why understanding of different layers of
networks is indispensable.
The figure below describes the general layered model that could serve as a reference for IMT-2020.
Detailed layered models for different use cases and scenarios are for further study.
Figure 6. Layered model of performance for IP service in IMT-2020 * Examples of lower layers are, Wireline: MPLS, Ethernet, Optic Fibre, etc.
Wireless: PDCP, RLC, Air interface, etc.
10 QoE parameters
Various IMT-2020 standards differ in terms of parameters employed to evaluate QoS. Since QoS
parameters are the basic building block of QoS framework, it is necessary to define QoS parameters
for IMT-2020.
In this context, this section proposes two methodologies for defining QoS parameters of IMT-2020
to build the fundamentals of common end-to-end QoS framework for IMT-2020.
1) To select relevant QoS parameters from existing standards and integrate the selections in
one coherent framework
2) To newly define QoS parameters from zero base that are suitable for IMT-2020 network
- 124 -
TD 208 (PLEN/13)
10.1 Selecting QoS Parameters from different standards
To select relevant QoS parameters from existing standards, it is necessary to identify the QoS
parameters employed by existing standards. This section will therefore review the parameters of
wireline standard from ITU-T and wireless standard from 3GPP.
10.1.1 ITU-T Y.1540, Y.1541
ITU-T recommendation Y.1540 defines different QoS parameters and Y.1541 selects four major
parameters to classify QoS classes: IPTD (IP Packet Transfer Delay), IPLR (IP Packet Loss Ratio),
IPER (IP Packet Error Ratio) and IPDV (IP Packet Delay Variation).
IPTD is the time between the occurrences of two corresponding IP packet reference events. IPTD in
this context denotes mean IP packet transfer delay performance parameter, which is the arithmetic
average of IP packet transfer delays for the population of interest.
IPLR is the ratio of total lost IP packet outcomes to total transmitted IP packets in a population of
interest. In other words, it describes how many packets were lost relative to number of packets
transmitted.
IPER is the ratio of total errored IP packet outcomes to the total of successful IP packet transfer
outcomes plus errored IP outcomes in a population of interest. In other words, it describes how
many packets faced error out of all packets that were transferred.
IPDV is the packet delay variation in the two-point interval experienced relative to the reference IP
packet transfer delay (it is the absolute IP packet transfer delay experienced by a selected IP packet
between the two points).
Please note that the parameters on end-to-end interval are derived from their counterparts in
segments of the network and the method is described in Y.1541.
10.1.2 3GPP TS 23.107, 3GPP TS 23.203, 3GPP TS 23.401
3GPP, as noted in previous input documents, defines QoS with the concept of bearer. Bearer is a
link between two end-points defined by a certain set of characteristics (on layers 1 to 2/2.5). The
QoS is then controlled by two major parameters: QCI (QoS Class Identifier) and ARP (Allocation
and Retention Priority).
Holistically, ARP is the standard for prioritizing bearer establishment and QCI is the standard for
prioritizing packet transfer. ARP will consist of the priority level and parameters related to “pre-
emption” of resources.
QCI, on the other hand, provides detailed QoS information for types of bearers. Firstly, bearers are
defined either as GBR (Guaranteed Bit Rate) or MBR (Maximum Bit Rate) where the former serves
to guarantee the throughput. Secondly, bearers possess thresholds of parameters such as packet
delay and packet error loss rates to ensure QoS.
Packet delay is an upper bound for the time that a packet may be delayed between the UE (user
equipment) and PCEF (Policy and Charging Enforcement Function). It is, in other words, a
maximum delay with a confidence level of 98 percent. Packet error loss rate is an upper bound for
the rate of SDUs (Service Data Unit; e.g., IP packets) that have been processed by the sender of a
link layer protocol but that are not successfully delivered by the corresponding receiver to the upper
layer. In other words, it defines an upper bound for a rate of non-congestion related packet losses.
(3GPP TS 23.203)
- 125 -
TD 208 (PLEN/13)
10.2 Approach for defining new parameters
This section proposes to utilize the framework by ITU-T Recommendation I.350 in defining new
parameters.
Recommendation I.350 defines 3x3 matrix for QoS parameters with each row representing one of the
three basic and distinct communication functions (access 21 , user information transfer 22 and
disengagement23) and each column representing one of the three mutually exclusive outcomes
possible when a function is attempted (speed24, accuracy25 and dependability26). Table 2 shows the
defined 3x3 matrix for QoS parameters. The parameters are then mapped onto the matrix with outage
thresholds defined.
Table 4. 3 x 3 matrix approach for QoS parameters
Speed Accuracy Dependability
Access
User information transfer
Disengagement
The 3x3 performance matrix may be extended to address QoS and NP of IMT-2020. The performance
criterion might be supplemented with criteria such as ease-of-use. The communications functions
might be supplemented with information storage, information translation, and brokerage functions.
Such addition of functions and criteria is possible, but the functions should be quantifiable.
Identification of each affordable parameter is for further study.
Editor’s Note #1: Figure1/G.1000 shows the extended matrix between criteria and function to
facilitate identification of communications QoS criteria.
Editor’s Note #2: The parameters should take into account the characteristics of IMT-2020 specific
applications such as remote surgical operation, autonomous driving and virtual reality. The details
are for further study
Editor’s Note #3: In addition, for Device-to-Device and Device-to-Network cases with very low delay
(1ms), definition of Measurement Point and Monitoring Methodology is critical. The details are for
further study.
11 QoS classes and their performance objectives
QoE requirements of the applications/services for IMT-2020 can be identified by an extremely
wide range from best effort to very stringent level.
21 Issuance of an access request signal or its implied equivalent at the interface between a user and the communication network
22 Begins on completion of the access function and ends when the “disengagement request” is issued. It includes all formatting,
transmission, storage, error control and media conversion operations performed on the user information during this period
23 Issuance of a disengagement request signal
24 Describes the time interval that is used to perform the function or the rate at which the function is performed
25 Describes the degree of correctness with which the function is performed
26 Describes the degree of certainty (or surety) with which the function is performed regardless of speed or accuracy
- 126 -
TD 208 (PLEN/13)
These various levels should be classified as follows;
1) Based on end-to-end user expectation of impairments and is therefore not dependent on any
specific technology (network as well as application) for its validity. But the classification
should be easily applied to network technologies for the purpose of implementation and
operation.
2) Shows how the performance parameters (delay, delay variation, loss, etc.) and their
objectives can be grouped appropriately, with implying that one class may "better" than
another.
Specific QoE classes and their performance objectives for IMT-2020 are for further study.
Editor’s Note: This is an important topic and we are more than welcome to have suggestions
12 Allocation guidance
IMT-2020 will consist of various use cases that will require different connectivity configurations.
This means that the QoS framework has to take into account various cases in order to ensure QoS of
connectivity in IMT-2020.
One of the aspects that deserve special treatment is QoS budget allocation (also known as
impairment allocation). Although end-to-end QoE requirement will be defined, the implementation
will be different for various networks with different circumstances. This calls for an in-depth study
on budget allocation approaches.
In this context, this section outlines different methodologies for QoS budget allocation and
identifies additional consideration to be considered in the IMT-2020 QoS framework.
12.1 Methods for QoS Budget Allocation
This section will outline QoS budget allocation methods as described in ITU-T Recommendation
Y.1542 and identify the need for a new approach for IMT-2020 specific connectivity cases. If
details are necessary for the first four subsections, please consult Y.1542.
12.1.1 Static Approach
This approach divides the UNI-to-UNI path into a fixed number of segments and budgets the
impairments such that the total objective is met in principle. It requires that individual segments
have knowledge of the distance and traffic characteristics between the edges of their domains, as
these properties of the segment affect the resulting allocations.
An important aspect of the static allocation is its dependence on the number of providers, as the
allocation has to be done accordingly. This can result in undershooting or overshooting the
objective because any actual path may traverse a different number of network segments from what
was assumed to be the case in the allocation scheme.
12.1.2 Pseudo-static Approach
In this approach, each provider would have knowledge of how many providers are present in the
traffic path and allocate among each other without wasting part of the impairment budget. Service
providers may reallocate their impairment target among the segments under their control.
- 127 -
TD 208 (PLEN/13)
12.1.3 Signalled Approach
In this approach, providers will use signals to communicate and determine impairment budgets. In
this approach, the use of resource management and signalling for the purposes of impairment
apportionment is assumed. This section will consider only two kinds of signalled approach for
simplicity.
The first type of signalled approach is negotiated allocation approach. In this approach, networks
negotiate with one another in allocating impairment budget. Starting with initial segment
impairment targets, based possibly upon the static and pseudo-static allocations, the networks may
negotiate for any “impairment budget” excesses, and to advertise to multiple interested parties if
they can provide a network service that is within their collective impairment budget. If it is not
possible to do so, the network can ask the previous network (or the user) whether more impairment
budget can be allocated such that the delivery path can be determined.
The second type of signalled approach is ranged allocation approach. In this approach, the range
between the minimum and maximum of the allocated impairment budget for every segment along
the data path is negotiated and calculated out by the use of resource management and signalling
among the segments. Any value within each segment impairment budget range, when added with
those of other segments, can meet the total impairment budget target for the whole data path. Thus,
every segment itself can choose an appropriate value within its allocated budget range under the
consideration of optimizing its resource utilization.
12.1.4 Impairment accumulation Approach
This approach is where possible performance levels offered by each provider are used to calculate
the estimate of UNI-UNI performance and lead to decisions on path/QoS. The mechanism starts
with a requesting provider determining a path that packets will follow and requesting each provider
for the performance level that each will commit to. With the offers, the requesting provider will
estimate the overall performance level and compare it with the UNI-to-UNI QoS class/objectives. If
the path does not meet the requested objectives, the provider could take one of the following actions
1. Path negotiation: An alternative path might be sought (repeating the request and
comparison process for the new path)
2. User negotiation: An alternative service class or relaxed objectives could be offered.
12.1.5 Need for a new approach
As noted in section 7, there are IMT-2020 specific connectivity cases (cases #4 and #5) that deserve
special treatment. Device-to-network communication is different from conventional communication
in aspects such as frequency of communication (periodic) and type of traffic generated (usually
more signalling traffic than data). Device-to-device communication also is distinctly different from
conventional communication because the distance will be much shorter and the configuration will
be simpler (with smaller number of nodes). The differences show that in-depth study is necessary to
develop QoS budget allocation for these connectivity configurations.
Editor’s Note: This is an important topic and we are more than welcome to have suggestions
- 128 -
TD 208 (PLEN/13)
13 Examples of end-to-end connectivity over wireless and wireline networks
Editor’s note: This clause was originally indicated as an appendix in the draft output from the end-
to-end QoS group.
13.1 International Voice Call
When devising SLA (service level agreements) of international voice calls for enterprise customers,
international standards provide legal ground. The issue in this business is that the recommendation
of 150ms delay (or latency) in one way (customer’s QoS requirements from mouth to ear
connectivity) is enforced for an operator in concern for natural customer experience, and end user
will suffer from longer delay than is acceptable.
As indicated in Input Document I-011 submitted to the first Focus Group meeting, there are,
however, two different relative standards for wireline and wireless networks respectively. ITU-T
Recommendation Y.1541 specifies end-to-end delay to 100ms (excluding 50ms processing delays
in both end terminals) for real-time voice application on QoS class 0 in wireline network as 3GPP
TS 23.107 Rel.12 does so for conversational voice on QCI 1 in wireless network.
The resulting delay of a voice call is likely to exceed the threshold of 150ms. When domestic
wireless operator and an international wireline network operator maintain their QoS level at 90ms
each, both of them have fulfilled their legal responsibility of SLA, but the end user will experience
QoS of 180ms delay, which is not tolerable and is worse than the customer’s expectation (100ms).
Since IMT-2020 network should consider some cases where services are provided over wireless and
wireline networks of different operators, the current disparate standards on wireless and wireline
networks are not suitable for providing customer QoS requirements. Therefore, a new standard
applicable on both wireless and wireline networks is necessary for IMT-2020.
13.2 Domestic Video Telephony
With the proliferation of smart devices and electronic devices, video telephony has become a
common service for the public. Since smart devices are connected to the internet via WiFi and
Cellular, and PC via wireline, integrated perspective (wireline & wireless) in domestic connectivity
on QoS management is necessary for ensuring customer satisfaction of video telephony QoS.
Video Telephony as used here implies a full-duplex system, carrying both video and audio intended
for use in a conversational environment. As such, the same delay requirements as for conversational
voice will apply in principle (i.e. no echo and minimal effect on conversational dynamics) with the
added requirement that the audio and video must be synchronised within certain limits to provide
"lip-synch".
The quality of video must take into account the nature of human eye. Human eye is tolerant to some
loss of information, so that some degree of packet loss is acceptable depending on the specific video
coder and amount of error protection used. It is expected that the latest MPEG-4 video codecs will
provide acceptable video quality with frame erasure rates up to about 1%. It should be noted that the
QoS of video (in video telephony) may vary depending on compression ratio and application (i.e.,
real-time streaming, buffered streaming, real-time conversation, etc.), but the QoS threshold of
voice should be 150ms as noted in 3.1.
Regarding the QoS of video telephony, Input Document I-011 submitted to the first Focus Group
meeting describes the definition by current standards. ITU-T Recommendation Y.1541 specifies
end-to-end delay to 100ms (excluding 50ms processing delays in both end terminals) and 10-3
Packet Loss Ratio for real-time video telephony application on QoS class 0 in wireline network
- 129 -
TD 208 (PLEN/13)
while 3GPP TS 23.107 Rel.12 does 150ms delay and 10-3 Packet Error Loss Rate for conversational
video on QCI 2 in wireless network.
The resulting delay of a voice call is likely to exceed the threshold of 150ms. When domestic
service operator maintain their QoS level at 90ms for wireline and 120ms for wireless each, both of
the networks have fulfilled their standard-based operation, but the end user will experience QoS of
210ms delay, which is not tolerable and is worse than the customer’s expectation (100ms).
Since IMT-2020 network should consider the case where a service provided over wireless and
wireline networks within a single operator, it is not suitable to apply current disparate standards
within the operator. This calls for a new standard applicable on both wireless and wireline networks
for IMT-2020.
13.3 Telecommunication services for Emergency/Disaster Relief
In an emergency, available network resources are dramatically reduced and calls for a prioritization
of communication requests. Some forms of communications, such as calls between disaster-related
government agencies, have greater importance than others, or perform a more critical function than
other forms of communication. Classifying priority classes and assigning relative priorities can help
enhance efficient and timely use of network resources.
In this case, however, a single standard encompassing wireless and wireline networks is necessary
for ensuring consistent customer QoS requirement and enhancing operational efficiency in IMT-
2020.
In addition, some parts of the network (whether randomly located or concentrated) will be damaged
and must be replaced by temporary measures during disaster. In this process, what used to be
wireline network may be replaced by temporary wireless networks and the opposite may hold true.
It is therefore essential to define the comprehensive (wireless & wireline) QoS requirements of
disaster relief systems independent of the type of technologies/protocols across the network even
during disasters.
It should also be noted that communications during disaster take place in various forms such as
voice, SMS/MMS and video streaming. These forms of communications need to satisfy very
stringent QoS requirements; 1) exact location information of casualties, 2) relief instructions from
control tower, 3) high-definition real-time video of the disaster site for first aid, etc.
While cases similar to the ones presented in 3.1 and 3.2 will occur, communication may have to go
through from a wireless network to wireline network in a single operator to another operator’s
network. The worst case scenario will be going from an operator A’s wireless network to operator
B’s wireless network via each operator’s wireline network. In this case, each operator and each
network may maintain QoS level at 90ms, each fulfilling own legal responsibilities. Yet, the end
users will perceive an overall delay of 360ms and it will be difficult to provide high-definition real-
time forms of communications.
Since current standards employ different QoS parameters (e.g., 3GPP defines the type of traffic,
packet delay and packet loss while ITU-T Y.1541 defines IP packet delay, IP packet delay
variation, IP packet loss and IP packet error), communication during disaster will increase
complexity of operation and may lead to confusion of QoS management.
In addition to a common QoS parameter, methods for QoS implementation (e.g., resource
reservation and priority control) can also be matched. While cellular communications employ pre-
emptive measures to guarantee QoS, wireline communications process priorities of individual
packets. For consistent operation and management, it is recommended that a common QoS
implementation method be applied over both wireline and wireless networks.
- 130 -
TD 208 (PLEN/13)
Appendix IV
Mobile front haul and back haul
Editor’s Note: Appendix IV was produced during the FG-IMT 2020 focus group in order to
investigate gaps in standardization related to IMT-2020. While the request from SG-13 was to
deliver a report outlining standardization gaps, the consensus of the focus group was that the
working documents produced and used during the focus group work contained useful information
for future work and should be captured. Note, however, the focus group concentrated on producing
accurate descriptions of the standardization gaps in the main body of this document; some minor
errors may exist in the appendices. They are, however, the output of the focus group but are
provided for information only.
Editor’s Note: This appendix uses clause references in a form usually associated for normative text.
This is maintained for this report to align with references made in the main body of this report. The
original text was assuming and Appendix D, not the current Appendix IV
This document contains the baseline of Annex D going into the Beijing meeting. Comments
discussed on the Oct. 14 teleconference have been addressed.
Annex D: Mobile front haul and back haul – Drivers, Challenges, and Solutions
1. Scope
This document contains material relevant to Mobile Front-haul and Mobile Back-haul.
2. References
[Cisco] Cisco Visual Networking Index (VNI), "Global Mobile Data Traffic Forcast Update," Feb.
2013, http://www.gsma.com/spectrum/wp-content/uploads/2013/03/Cisco_VNI-global-
mobile-data-traffic-forecast-update.pdf
[Detnet] IETF Deterministic Networking, http://trac.tools.ietf.org/bof/trac/wiki/DetNet.
[Docomo] Y. Shimazu, H. Ohyane, T. Watanabe, T. Yajima and S. Suwa: “LTE Base Station Equipment Usable with
W-CDMA System,” NTT DOCOMO Technical Journal, Vol. 13, No. 1, pp.20-25, June 2011.
(https://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol13_1/vol13_1
_020en.pdf)
[ITU-R_F15] Report ITU-R M.2375-0, "Architecture and topology of IMT networks" Fig.15, p40,
Oct.,2015
[ITU-R_F15] Report ITU-R M.2375-0, "Architecture and topology of IMT networks" Fig.16, p40,
Oct.,2015
[MEF 22.1.1] MEF 22.1.1- Mobile Backhaul Implementation Agreement
[MIC] Ministry of Internal Affairs and Communications, "2011 WHITE PAPER on Information
and Communications in Japan," Part 1, Section 1 page 1,
http://www.soumu.go.jp/johotsusintokei/whitepaper/eng/WP2011/part1.pdf.[MSR] Mobile
- 131 -
TD 208 (PLEN/13)
Society Research Institute, NTT DOCOMO, INC, “Disaster resistant information society”,
NTT Publishing Co., Ltd., 2013 (in Japanese).
[NGMN] NGMN, "Next Generation Mobile Network 5G White Paper," Feb. 2015,
https://www.ngmn.org/uploads/media/NGMN_5G_White_Paper_V1_0.pdf.
[CPRI]; Common public radio interface (CPRI)-interfaces specification.
[TSN] IEEE Time-Sensitive Networking Task Group, http://www.ieee802.org/1/pages/tsn.html.
[TTC] TTC white paper “white paper on Future Networking issue”, Apr., 2015
http://www.ttc.or.jp/e/topics/20150413/download/
3 Terminology Definitions
3.1 Backhaul refers to the network paths connecting the Base Station sites and the Network
Controller/ Gateway sites.
3.2 Fronthaul refers to the intra-base-station transport, in which a part of the BS function is
separated to the remote antenna site. (Note that this definition is equivalent to the definition
given in [MEF 22.1.1] for the current 4G technology.)
4 Abbreviations and acronyms
4G: 4th Generation (mobile system) 5G: 5th Generation (mobile system) ADC: Analogue Digital Converter
a.k.a. : also known as
API: Application Programming Interface AR: Augmented Reality BBU: Base Band Unit BDE: Base station Digital processing Equipment BH: Backhaul BRE: Base station Radio processing Equipment BS: Base Station C-RAN: Centralized Radio Access Network CB: Coordinated Beam Forming
CoMP: Coordinated Multi-Point CPRI: Common Public Radio Interface CS: Coordinated Scheduling
DAC: Digital Analogue Converter
DBA: Dynamic Bandwidth Allocation DPS: Dynamic Point Selection
DSP: Digital Signal Processing E2E: End to End EVM: Error Vector Magnitude
FH: Fronthaul
- 132 -
TD 208 (PLEN/13)
IEEE: The Institute of Electrical and Electronics Engineers, Inc. IETF: Internet Engineering Task Force IMT: International Mobile Telecommunication IoT: Internet of the Things IoE: Internet of Everything IP: Internet Protocol ITU-T: International Telecommunications Union JR: Joint Reception
JT: Joint Transmission
LH: Long Haul LRE: Low-power Radio Equipment M2M: Machine to Machine MAC: Media Access Control
MAN: Metropolitan Area Network
MBH: Mobile Backhaul MEF Metro Ethernet Forum MFH: Mobile Fronthaul MIMO: Multi-Input Multi-Output MPLS: Multi-Protocol Label Switching MVNO: Mobile Virtual Network Operator NFV: Network Function Virtualization
NGFI: Next Generation Fronthaul Interface
NGMN: Next Generation Mobile Network ODN: Optical Distributed Network OFDMA: Orthogonal Frequency-Division Multiple Access
OAM: Operation and Management
OPEX: Operating Expense
OSU: Optical Subscribing Unit
OTN: Optical Transport Network OTT: Over The Top P2MP: Point to Multi-Point PAM: Pulse-Amplitude Modulation PDCP: Packet Data Convergence Protocol
PHY: Physical
PON: Passive Optical Network ppb: parts per billion
QoS: Quality of Service Qxx: Question xx (xx=number) RAN: Radio Access Network RAT Radio access technology RF: Radio Frequency
- 133 -
TD 208 (PLEN/13)
RLC: Radio Link Control
RoF: Radio over Fiber RRH: Remote Radio Head RRU: Remote Radio Unit SDN: Software Defined Networking SGxx: Study Group xx (xx=number) SP: Signal Processing
sup: Supplement
TDD: Time Division Duplex TDM: Time Division Multiplexing de-multiplexing TDMA: TDM Access TRX: Transmitting Receiving Things TSN: Time-Sensitive Networking UE: User Equipment VLAN: Virtual Local Area Network WDM: Wavelength Division Multiplexing de-multiplexing WG: Working Group WiFi: Wireless Fidelity
5. Conventions
None
6 Future Use Cases and Technology Drivers
6.1 Large capacity
According to [Cisco], the traffic in mobile communication networks is increasing at an annual rate of 61% and projected to grow 1000 times in the future. Therefore, it is required to summarize the issues as to whether the future requirements can be supported by the current network architecture for mobile communications. Figure A.1 provides a VAN diagram outlining the requirements for future mobile communications. Compared with 4G, the future mobile communication requires larger capacity in the Extreme area, faster communication in areas such as Rural, Urban, Dense, etc. and expanded coverage in the isolated area [TTC].
Especially regarding the capacity increase, applications like AR (Augmented Reality) and real-time
cloud access are assumed, with data rate requirements of 100 to 1000Mbps at any given time and
around 10Gpbs at peak.
- 134 -
TD 208 (PLEN/13)
Fig. A.1. Requirements for future mobile communications
6.2 Low latency
In the future mobile network, it is expected that some new mobile services with very low latency requirements will appear, which could not be provided with 4G. Specifically, an E2E latency requirement of 1ms is being considered for such extreme applications as tactile communication, AR and auto-driving.
6.3 Power saving
The forecast traffic growth is very large (in bandwidth, in number of cells, in user devices).
Continuing forward with the current state of the art power consumption levels would be
unsupportable, both from carbon footprint and power availability perspectives. Therefore, the
power consumption of all the elements must be controlled and reduced to avoid this problem.
6.4 Large-scale disaster/congestion/failure resilience
Disaster resilience can be considered from congestion and failure resilience perspectives.
For congestion resilience, the traffic during the Great East Japan earthquake in 2011 was 50 to 60
times higher than normal with regard to voice communication via cellar phones. Concentrated
service requests from base stations that cover a wide area causes resource shortage and congestion.
Telecommunication carriers then implemented 70 to 95% traffic control [ MIC]. It was extremely
difficult for users to establish a voice communication. According to a survey result, people made a
call about 12 times on average until they succeed and about 14 times on average until they give up
in disaster-stricken areas[ MSR].
For failure resilience, with regard to unexpected communication process disruption due to damage of network functions, the earthquake and tsunami caused collapse, flooding and washout of building facility, split and damage of undergrad cables, duct lines, etc., damage of utility poles, damage of aerial cables and collapse and washout of mobile base stations, which resulted in severe damage [ MIC]. Although no specific numerical target levels are shared as a future scenario in terms of disaster resilience, the government and users both demand further enhancement of
User Throughput [bps/person]
User density
[person/km2
]
Rural Urban Dense Extreme Isolated
Small Cell
Micro Cell Macro Cell
4G Diagram
Higher
Throughput
Increase
capacity
Coverage
expansion
- 135 -
TD 208 (PLEN/13)
telecommunication networks based on the lessons learned from the Great East Japan earthquake described above.
6.5 Diversified types of terminal/traffic/operator
For the traffic for conventional mobile terminals used by people, as high-definition terminals with a large screen and video capture function become common, more and more various video contents are used as a medium and the OTT service is expanded, which increases video traffic. Furthermore, as M2M terminals get popular, the traffic of M2M terminals is expected to increase sharply. In general, a connection topology like sensor network is assumed for M2M terminals, with possible use cases such as management, monitoring and remote control of production facilities, lifelines, building and housing, vending machines and heavy equipment. The device mobility is relatively low and both the occurrence frequency and data volume of each traffic tend to be small, but the number of terminal connections per unit area becomes very large. From 2020 and onward, along with the advancement toward IoT and IoE incorporating M2M, the terminals and applications to be accommodated will further diversify. It is also expected that there will be many new players in the mobile service industry as MVNO.
7. Technical Challenges
This chapter outlines some major technical issues for Mobile Front-Haul and Mobile Back-Haul
networks.
7.1 Transport bandwidth
The rapid uptake of cellular data services is at the same time exciting and frightening. The rapid
growth of traffic has very large revenue and business potentials, and operators are keen to take
advantage of this. On the other hand, such exponential growth will soon out-strip the capability of
4G networks, even with the reinforcement that seems inevitable now. The usual incremental pace of
improvements will not be enough. This is the rationale for the development of “5G wireless”, which
aims to provide 1000 times the bandwidth of 4G networks. Herein, we equate the “5G” class of
wireless technology with that being considered in the IMT-2020 Focus Group.
This high-level goal of three orders of magnitude increase in capacity is often analyzed into three
major enhancements. The first is an increase of bandwidth. While the usual unit of bandwidth in
4G is 20 MHz, that in 5G systems will be able to use 200 MHz; this enhancement should give
directly a 10x increase in capability, if the network and terminals can terminate such a large
bandwidth, and if such spectrum can be found on the airwaves [Comment] I couldn’t understand
this sentence well. Is this mean the following? “if such bandwidth can be allocated” [Proposed
resolution] If yes, change the phrase to above one. . One would have to assume that if the demand
is there, this will happen. [Comment] I couldn’t understand this sentence well. Is it collect?
[Proposed resolution] Please re-check the sentence.
The second enhancement is an increase of cell density. Beginning with the existing 4G macro-cell
sites, we can imagine that 6~10 micro-cells would be placed around each. The increase in capacity
is roughly an order of ten, but it is not so easy to calculate as the capacity of the micro-cells might
not be as high as the macro-cells, and calculating “capacity” over a physical network is not a simple
task. (For example, is it cell-edge rate, or aggregate average rate?)
The third enhancement is the exploitation of massive multi-input multi-output (MIMO) techniques.
Included here are such things as antenna arrays at each site or sector, and coordinated multi-point
(CoMP) transmission over a set of sites. To achieve the desired 10x increase in capacity, MIMO
- 136 -
TD 208 (PLEN/13)
orders of 64x64 are being routinely considered. This enhancement has a knock-on effect that to
produce the MIMO gain efficiently (that is, to implement Coordinated Transmission and Reception),
the centralization of the baseband processing is required. This has stimulated the interest in
centralized radio access network (C-RAN) concepts, and hence wireless front haul.
Impact of these three enhancements on the optical transmission requirements should be considered.
Increases of spectrum and of the number of sites will lead to direct linear increases of transport
required. If a typical 4G sector is served by a 100 Mb/s backhaul link, a 200 MHz 5G sector would
need 1 Gb/s. However, the introduction of MIMO and C-RAN leads to much more bandwidth.
First, front haul networks transport 30 bits per sample, while the actual information capacity in those
samples is perhaps only 5 bits; this is a 6x increase from the back haul model. Second, the MIMO
multiplicity directly scales the transport needed (e.g., 64x64 MIMO is a 64x increase in transport),
because the data reduction occurs in a central location. Taken together, this amounts to a 400x
bandwidth increase, so a single 200 MHz sector of 5G would need about 400 Gb/s of capacity.
Combining that with 10x for network densification and thus resulting in 4 Tb/s of capacity for each
macro-site sector.
Gap D.7.1-1: Large capacity transmission. See Clause 7.4.1 of the main body of this report.
7.2 Functional split
Clearly C-RAN bandwidth requirement needs to be addressed. Large bandwidth capacities are now
seen in long-haul networks and rather expensive. The costs of this transport would outweigh the
presumed benefits of the 5G wireless system. At this point, some more effective system
engineering is needed to help balance the demands of the wireless with the capabilities of the
optical transport system.
There are already some remediation methods that have been proposed. For example, the current
interface de-facto standard (CPRI) has certain overheads that are not so efficient, especially when the
interface is scaled to higher rates, and when payload compression is used.
This is being addressed in some of the newer interface standards being developed now. The number
of bits per sample can be adjusted, or the samples can be compressed to some degree. These payload
compression methods (which can be lossy) can achieve perhaps a 2 to 3x reduction in bandwidth
demand, but they also come at the price of reduced signal fidelity. They also make the processes of
signal shaping and automatic gain control more critical, as the bit depth of the system is being
reduced.
Beyond these small factors, another approach would be to rethink the entire C-RAN architecture,
such that some functionality is pushed out to the remote radio units. This can reduce the data volume
by large amounts; however, it sort of reduces the utility of the system. It makes the RRU have a
bigger size, power consumption, and cost. Moreover, it prevents a large part of CoMP gain. So,
while the re-architecting of 5G might have to be used at some point, there is still an interest in keeping
the remote simple and centralizing as much processing as we can.
7.3 Network Timing and synchronization
Stringent latency requirements (of the order of 1 ms) is one of the main target for some of the
applications that need to be supported by 5G (e.g. automatic traffic control, remote surgery, tactile
internet).
In this respect the following is stated in the [NGMN]:
- 137 -
TD 208 (PLEN/13)
“The 5G system should be able to provide 10 ms E2E latency in general and 1 ms E2E latency for
the use cases which require extremely low latency.”
Consequently, this imposes significant constraints on the transport network in order to meet such a
requirement, particularly, in packet transport technologies, where queuing and processing delays
over multiple hops could easily exceed the above limit.
Of this point it should be noted that initiatives already started within IEEE [TSN] and IETF
[Detnet].
Network synchronization and distribution of accurate time and frequency synchronization
references in the network is another key issue for a successful deployment of 5G.
Several aspects of network synchronization and distribution require careful analysis and below
some of the relevant items are highlighted:
Wider use of TDD (Time Division Duplex) as a radio technology. This is a main example
where accurate phase alignment is required between radio frames in order to control
interference between uplink and downlink signals delivered by adjacent base stations and/or
UEs.
Continued increased use of features implying time synchronization requirement such as
carrier aggregation and broadcast.
Dense radio base station deployments leading to potentially greater need for coordination.
New Radio technologies (and related new numerology) may be defined (e.g. addressing
some of the key 5G requirements) potentially implying requirements for more stringent than
the 1 microsecond that is currently considered by ITU-T SG15 Q13.
Sharing of resources will also likely require new paradigms in terms of administration and
operations of the synchronization networks.
Ongoing evolution of SDN and NFV concepts and related impacts on synchronization
network architecture and operations.
New applications, and users (IoT in particular), potentially leading to new synchronization
demands.
5G requirements on transport in terms of reliability, latency, robustness (where the fronthaul
segment is one of the most demanding use case from a synchronization), synchronization as
a key enabler for transport.
In general, 5G will impose a number of requirements (such as higher capacity, latency, handling
with a single platform a number of applications that require timing such as industrial automation,
energy efficiency) that in one way or another could result in an accurate network synchronization
requirements.
The network architecture is also particularly relevant from a synchronization perspective due to new
concepts like NFV, SDN, Cloud, distributed applications that may also impact the way
synchronization networks will be defined.
The main group within ITU-T dealing with synchronization is SG15 Q13.
- 138 -
TD 208 (PLEN/13)
This Question (in cooperation with other relevant questions in SG15) has been working in the last
few years on solutions to deliver time and synchronization references over packet and Optical
transport networks. Proper design is required in order for an optical transport networks (OTN) to
meet the applicable synchronization requirements.
However some of the most stringent requirements applicable in fronthaul networks cannot be met
by the existing standards.
However, more work is required to address 5G requirements and the stringent latency.
Gap D.7.3-1: Timing requirements. See Clause 7.4.1 of the main body of this report.
Gap D.7.3-2: Low latency. See Clause 7.4.1 of the main body of this report.
7.4 Power efficiency of fronthaul
Figures A.2, and A.4 show the configuration of Mobile Fronthaul.The major power saving issues in
the Mobile Fronthaul are:
- The connection between the BBU and RRH always uses a fixed rate regardless of actual traffic volume. - Deployment of small cells (increase of the number of devices) increases the total power consumption.
- Faster optical transceivers, electrical processing circuits, etc. between the BBU and RRH due to
higher data rate over radio increases power consumption.
Fig. A.2. Mobile Fronthaul configuration and power saving issue
Power consumption due to fixed rate communication As is the case in the Mobile Backhaul, mobile communication traffic fluctuations by time of day is also an issue in the Mobile Fronthaul. Especially, traffic fluctuations between cells are greater, which is likely to become more remarkable with small cell deployment. Therefore, the current standard and system design that use a fixed rate for communication causes wasted power consumption during the hours with light traffic.
- 139 -
TD 208 (PLEN/13)
Increase in total power consumption due to increased devices For the future mobile network, small cell deployment is being considered to cope with further increase in traffic. This causes increased cells (i.e., increase in the number network devices that constitute a cell), which raises a concern about increase in total power consumption. Then, the impact of small cell deployment on the total power consumption for the Mobile Fronthaul has been estimated as follows.
Table A.1 shows the estimate assumption, which is typical of the network in Japan. It is assumed
that there are 100,000 macro cell sites with 6 sectors for the current network. For the future
network, it can be assumed that in addition to the current macro cells small cells are superimposed
and there are 1 million 1-sector small cells. The equipment power consumption used for the
estimate was determined in reference to the [Docomo] document. In addition, two types of small
cell transmission rate (1Gbps and 10Gbps) were examined. At that time, the power consumption of
10Gbps was calculated as 1.5 times of that of 1Gbps.
Table A.1. Estimate conditions
The power consumption for the current network (Pcurrent) and the power consumption for the
future mobile network (Pfuture) are calculated as follows. Where, Ncell is the number of cells,
Nsector is the number of sectors per cell, Pequip is power consumption of equipment, and Nport is
the number of ports on the equipment.
As a result of the calculation, the total power consumption for the Mobile Fronthaul is up to 900MW for the future network, twice that of the current network that is 450MW. Note that the power-generating capacity at a nuclear power station is about 500MW per plant. Increase in power consumption of equipment due to higher data rate The major factors for the power consumption for the Mobile Fronthaul include the optical transceiver part, the electrical processing circuit part and RF amplifier. As a result of higher data rate over radio, these devices need to be faster, which leads to increased power consumption.
The power consumption of optical transceiver is as shown in Table.A.2. For the optical transceiver,
enough power saving is implemented on the level up to 10Gbps and therefore the impact is small.
However, on the level of 100Gbps, power consumption increases sharply and the impact cannot be
ignored considering the power consumption with small cell deployment. It is required to consider
the impact of higher data rate on power increase also for the electrical processing circuit and RF
- 140 -
TD 208 (PLEN/13)
amplifier. High frequency bands may be added in the future network, so the impact due to added
frequency bands also needs to be examined.
Power consumption of optical transmission equipment with ultrahigh capacity
(1) Power consumption of optical transceiver
The current product level of optical transceiver is as shown in Table A.2. Each type of transceiver
listed in the table supports transmission distance of 40km. The power consumption of the optical
transceiver part in the transmission equipment is simply the required number of transceivers times
their power For instance, to achieve 1Tbps will consume 150W, and with about 100,000 macro cells
and a redundant configuration, the total power consumption would be:
150W * 100,000 * 2 = 30MW.
Table A.2. Optical transceiver types and power consumption
(2) Power consumption of electrical processing circuit (interface process)
In addition, the power consumption of interface processing part of the existing switch equipment is
about 30W per 10G-1 port. So the power consumption for the interface processing part to achieve
1Tbps is 3000W, which is 20 times greater than optical transceiver. And the consumption for the
entire network is 600MW. Therefore, integration of electrical processing circuits (40G, 100G) is
necessary to reduce the power consumption.
Gap D.7.4: Power saving by sleep or rate control. See Clause 7.4.1 of the main body of this report.
7.5 Large number of small cells
Figure A.2 shows the configuration of the Mobile Fronthaul. Due to high-speed data rate of mobile
terminals (great capacity at a cell), the capacity of the line used for the Mobile Front-haul needs to
be increased. For example, a transmission capacity of about 160Gbps (about 16 times) is required to
support 10Gbps terminals in the current CPRI-based Mobile Front-haul.
- 141 -
TD 208 (PLEN/13)
Fig. A.3. Configuration of Mobile Fronthaul
Furthermore, widespread deployment of small-size cells is expected to support high-speed and large-capacity mobile communications. In addition to macro cells with a radius of several kilometers, small cells with a radius of some dozens of hundreds of meters are being considered to be deployed together. For instance, assuming that a macro cell of 2km radius is replaced with small cells of 200m radius, the number of cells calculated based on the superficial area would increase 100 times. This brings up a concern about sharp increase of network cost due to increase in the number of links in the P2P configuration used for the current fronthaul. Figure A.4 and Figure A.5 provide the number of links in the macro/small cell. If, for example, a macro cell (2km radius) is replaced with small cells (200m radius), the following are expected.
The number of small cells increases 100 times.
Required fibers and MFH optical transmission equipment also increase 100 times due to the increase in the number of small cells.
The cost increase due to large capacity of MFH optical transmission equipment needs to be taken into account.
- 142 -
TD 208 (PLEN/13)
Fig. A.4. Number of links at macro cell
Fig. A.5. Number of links at small cell
Summarizing the issues for the Mobile Fronthaul based on the above discussion, the major issues are the followings: (1) Large-capacity transmission of 100Gbps or more and (2) Increase in the number of links. (1) Regarding the large-capacity transmission of 100Gbps or more per cell, possible methods include reduction of transmission data amount and improved efficiency with transmission data compression. In the current CPRI transmission, however, radio signals in use cannot be identified at the optical layer, requiring all radio signals to be sent. The bandwidth in use also cannot be identified at the optical layer. So the calculation is made using the peak rate.
(2) Regarding the increase in the number of links, the number of fibers and equipment is expected to increase as long as the current P2P configuration is used, causing the cost to increase. Thus the system change to P2MP may need to be considered. A specific method for achieving this can be PON (TDM/WDM techniques, etc).
Gap D.7.5-1: PON as the virtual digital wireline service. See Clause 7.4.1 of the main body of this
report.
Gap D.7.5-2: Large number of fibers for front haul. See Clause 7.4.1 of the main body of this
report.
7.6 Reliability and resilience
In the future mobile network, increase in traffic to be accommodated and expansion of
accommodated terminals including IoT are expected and the importance as social infrastructure will
be greater than ever. Therefore, the network needs to be more robust than ever against congestion
and fault in the event of disaster or fibre cut. The existing network can only cope with congested
traffic during disaster by temporarily managing network resources and therefore does not ensure
sufficient network resources necessary during an emergency. It is necessary to take fundamental
actions for the future network such as allowing for prompt enhancement.
It is necessary to build a network with high reliability that can secure communication lines, flexibly
and dynamically responding to Backhaul node change and topology change in such events as base
station outage.
- 143 -
TD 208 (PLEN/13)
ITU-T SG15 developed a number of protection recommendations such as G.873.1, G.873.2,
G.8031, G.8032.
Gap D.7.6: Reliability and resiliency. See Clause 7.4.1 of the main body of this report.
7.7 Diversified types of terminal/traffic/operator/FH&BH
The future mobile network is expected to further permeate society than the conventional mobile
network. Not only the conventional terminals like feature phones and smartphones that assume
usage by people, but also a number of terminals assumed to be embedded in devices are expected to
emerge, creating a variety of equipment. As a result, the traffic pattern may also be different. The
end point of communication will be machines instead of people, and the number of terminals for
M2M communication is expected to increase exponentially. Furthermore, the information exchange
in M2M is expected to have a traffic pattern that differs significantly from the server-client data
exchange in the conventional IP network. In addition, a variety of operators are expected to operate
mobile networks. Thus, new challenges for the network are generated by diversification of terminal
requirements, traffic patterns and mobile network operators.
In order to efficiently accommodate numerous M2M terminals, it is considered to be necessary to
implement policy control, addressing, etc. on a group basis for M2M terminals, which are different
from normal mobile terminals.
Along with diversification of applications including M2M/IoT, the number of MVNOs is expected
to increase to further improve the convenience of users. The network has to be flexible to release
sufficient resources for necessary core network functions to MVNOs. In meeting a number of
release requirements, there will be a various function requirements for each MVNO, which requires
scalability to meet new requirements.
For mobile operators, transport might become more complex and more flexibility might be required
to provide high quality services with reasonable cost, especially when networks deployment are
becoming denser.
It is expected that in the next-generation IMT-2020/5G networks, many different types of base
stations/devices are likely to be deployed, with different transportation requirements and targets.
As shown in Fig. A.6 [ITU-R_F15], the transport in future IMT network would involve base station
(BS) to device, device to device, and furthermore, BS to BS (or BS to dedicated relaying node) to
transport the data traffic back to/from the core network.
- 144 -
TD 208 (PLEN/13)
Fig. A.6. Illustration of different transport links in future IMT networks
Transport that is purely relying on optical fibre and microwave transmission may be inefficient and
costly to provide the end-to-end transport service in the future dense deployment due to economic
and/or propagation condition constraint. Wireless transport would be introduced for its inherent
flexibility, low cost, and ease of deployment. It is therefore expected that the hybrid deployment,
including optical fibre, microwave, wireless and other medias/technologies would be the case for
BS to BS (or BS to dedicated relaying node) transport.
On the other hand, statistics show that in dense and heterogeneous networks, traffics of different
BSs at different locations vary quite a lot, which is due to the non-uniform traffic distribution, and
time-varying traffic that results in high peak-to-mean data traffic ratio at a given location. It in turn
indicates that statistical multiplexing of radio resources become possible. By flexible use and
assignment of the radio resources (including spatial-, frequency- and time-domain resources), the
hybrid fibre/microwave/wireless deployment for BS to BS transport could meet the multiple
requirements on achieving high capacity, while maintaining low cost and ease of deployment.
Furthermore, the flexible use of radio resources among BS to device, device to device, and BS to
BS transport might show more significant benefit to meet the different transportation requirements
and targets with specific traffic distributions and propagation environments. Therefore, new
transport solutions must be flexible enough to make sure that the scarce radio resources among the
network could be multiplexed statistically to match the required service traffic distribution and the
related propagation environments.
The flexibility requirement includes the capability of flexible topology and the capability of flexible
resource assignment or sharing. The former refers to the capability of flexible use of spatial-domain
resources, i.e., the deployed devices, and flexible configuration of the connection of the network
nodes. The latter refers to the capability of flexible sharing and use of the time- and
frequency-domain resources with the flexible configuration of the topology.
Besides, such flexibility needs also to improve other issues, such as reliability, co-existence with
other solutions, fast deployment, support of multiple applications with different QoSs, network
level energy efficiency, etc.
One example of flexible topology is shown in Fig. A.7 [ITU-R_F16]
- 145 -
TD 208 (PLEN/13)
Fig. A.7. Illustration of flexible topology
Gap D.7.7-1: Diversified types of terminals. See Clause 7.4.1 of the main body of this report.
Gap D.7.7-2: Diversified types of traffic . See Clause 7.4.1 of the main body of this report.
Gap D.7.7-3: Diversified types of network operator. See Clause 7.4.1 of the main body of this
report.
Gap D.7.7-4: Diversified types of RAN. See Clause 7.4.1 of the main body of this report.
7.8 Support of network slicing / management with FH&BH
One of the major architectural themes in 5G networking is the sliced network. The goal of this
concept is to provide as much access to the underlying network capabilities to the upper layer
applications. Front haul and back haul are part of the network, and hence are subject to this goal.
Fig. A.8. The sliced network and its relationship to MBH and MFH
Mobile packet coreRadio access network (RAN)UE
Control
Slice A
Slice B
Slice C
Network
management
and
orchestration
Applications & Services with various requirements (M2M/IoT, Content delivery, Tactile)
Cloud
Virtualized networks/platform App-Driven APIAPI
Physical infrastructure (network, computing and storage resources)
Network resources
Computation and storage resources UE Data Centers
MFH MBH TransportRAT(s)
Slice C
Application
Control plane
Access
Integration
management
Function #1
Slice A
Slice B
Function #2
Function #3 Function #4
MFH/MBH equipment
a) Functional assignment
d) Integrated management of mobile
and fixed access network
c) Control-plane for slice network
Slice network based
MFH/MBH b) Implementation of application
- 146 -
TD 208 (PLEN/13)
a) Functional assignment at aggregation part of MBH and MFH
In the mobile network for 5G, introducing logical network, namely, slice network, which means
separated network according to applications is assumed. In addition, transport system in core
network and MBH/MFH should keep interconnectivity with the existing IP network technology
where possible. The functional assignment at aggregation part of MBH and MFH is one of the key
discussion points for smooth interconnection between core and MBH/MFH network in the sliced
mobile network.
b) Implementation of application in MBH and MFH
For resiliency of mobile network, interworking between application and network is required.
Implementation of application at aggregation part of MBH and MFH realizes flexible control
according to use-cases and requirement of application by appropriate use of API, where possible.
However, it must be noted that typical front-haul networks are transporting very low-level
unresolved wireless signals, and so the control would be at an aggregate level.
c) Control-plane for slice network in MBH and MFH
For flexible control of mobile network, control-plane for slice network is required in MBH and
MFH. The assignment of control functions can be configurable for requirements of each slice
network.
d) Integrated management of mobile and fixed access network
Optical access technology is strong candidate for MBH and MFH. For construction of flexible and
cost effective network, integrated management of mobile and fixed access network is required.
[Missing a gap here]
8. Architecture and Solutions for Mobile Fronthaul
8.1 Digital Radio (CPRI) over optical fiber
The simplest solution is to use simple point to point fibers to connect inexpensive data-com
transceivers between the remote and central sites. The cheapest data rate at the current time is 10
Gb/s. The difficulty here is that to serve each 400 Gb/s sector would require 40 fiber pairs. This is
obviously too fiber-hungry for a realistic network deployment. Currently, 25 Gb/s interfaces are
starting to rise in popularity, and so this could reduce the fiber requirement here to 16. This is
better, but still not so desirable. There is continuing work on even higher speed line coding, such as
PAM-4 and 50 Gb/s transmission, which taken together could get us to 100Gb/s per wavelength.
The relevant standards in this case would be those developed in the IEEE P802.3 group
(LAN/MAN, a.k.a. Ethernet).
To reduce the fiber count further, WDM can be employed. For instance, 100 Gb/s interfaces that
employ 4 wavelengths of 25 Gb/s each are commonplace now. This can get the system to 4 fiber
pairs per sector, which starts to be reasonable. Using even more wavelengths can get us to a single
fiber per sector, which is indeed an attractive design point from an equipment perspective. However,
all of the WDM approaches suffer from the fact that while fiber is conserved the equipment still has
a large number of opto-electronic components. Perhaps this can be miniaturized using silicon
photonics, but for now it remains a more bulky packaging arrangement. From another perspective, it
would be better to reserve WDM for the network multiplexing of multiple sites, and use some other
method to develop the capacity for a single sector on a single wavelength channel. The relevant
standards here would be the G.989 series (NG-PON2) and G.9802 (Multi-wavelength access
systems), both developed by Q2/15; and the G.698.3 and G.metro recommendations, both developed
in Q6/15.
- 147 -
TD 208 (PLEN/13)
If we set our goal at larger capacity per wavelength, then we must consider more spectrally efficient
use of the channel. This leads us to the use of OFDM over the optical link. If we begin with optics
with bandwidth typical for a 25 Gb/s, then the RF bandwidth is about 20 GHz. Employing OFDM
could perhaps get us to 5 b/s/Hz, producing a 100 Gb/s link on each wavelength. This approach
reduces the requirement for WDM but it doesn’t entirely eliminate it. Also, if one considers what is
happening in this system, an OFDM signal (5G wireless) is being digitized and then carried over
another OFDM signal (optical). This double modulation is kind of inefficient from a processing
perspective. Currently, there are no standards for this type of link. They may be developed in Q2/15,
or potentially Q6/15; however, no formal plan has been established.
Gap D.8.1-1: Optimization of module or chip device design. See Clause 7.4.1 of the main body of
this report.
Gap D.8.1-2: PON with WDM overlay. See Clause 7.4.1 of the main body of this report.
8.2 Analog Radio over optical fiber (P2P and PON)
Taking this thought to the next step, directly carrying the wireless signal over the optical link seems
more efficient and natural. This is basically radio over fiber (RoF). In this case, the different MIMO
channels would be multiplexed using frequency division multiplexing. Assuming we begin with a
20 GHz bandwidth optical link, frequency division multiplex can easily fit 64 channels of 200 MHz
in this space using reasonable guard bands. So this system can achieve the goal of carrying an entire
sector on a single channel. Unlike earlier RoF systems, this application is unique in that all these
channels are being multiplexed in a single location. Hence, the necessary RF processing can be
accomplished digitally, using DSP techniques. Making the job easier is that all the MIMO signals
would belong to the same system, and therefore are identical in carrier frequency. The viability of
this new kind of digital frequency multiplexing based RoF has recently been verified experimentally.
Of course, nothing comes without a drawback, and in this case, the analog optical transmission will
induce some loss of signal fidelity. The major impairments here include quantitization noise in the
DSP and DAC/ADC, noise and nonlinearity in the optical-electrical conversion, and optical channel
impairments (e.g., dispersion). The back-to-back fidelity limited by the resolution of DAC’s and
ADC’s can be engineered to 1~2% error vector magnitude (EVM), and over a reasonable link budget
3~4% EVM can be achievable. The main optical constraint is signal power, and so optical
amplification is very effective in extending the reach, if required. This technology has been described
in a Supplement to the G-series of ITU-T recommendations (G.sup.55). Work on a normative
recommendation for some RoF systems has begun.
Using the RoF link as a building block, it would be possible to use WDM-PON technology to
multiplex signals from a typical macro-site onto a single fiber. A hypothetical network could consist
of a fiber (or fiber pair) running from the central processing point to the macro-site, where a
wavelength multiplexer element would derive multiple drop signals. Some of these would serve the
sectors running from the macro-site, and some would then be conducted to the surrounding micro-
sites. An interesting question arises here: do we need so-called colorless technology? WDM-PON
has always supported the idea that the end stations would be colorless and automatically tune to the
right color determined by their network connection. In this 5G wireless application, the number of
deployed units is far smaller than in typical access, and colorless operation is perhaps not necessary.
- 148 -
TD 208 (PLEN/13)
Gap D.8.2: Analog radio over optical fiber transmission. See Clause 7.4.1 of the main body of this
report.
8.3 Digital Radio (CPRI) over optical transport (OTN)
CPRI (or similar) interfaces can be transported over the Optical Transport Network (OTN) system. ITU-T SG15 recently agreed a new supplement G. Suppl 56 - Transport of CPRI signals in optical transport networks (OTN).This supplement describes alternative for mapping and multiplexing CPRI client signals into OTN. These mappings include direct mappings for native CPRI client signals and mappings that apply transcoding in order to gain bandwidth efficiency. However, there remain issues regarding symmetry requirements and network timing performance, as it is very demanding to deliver the very stringent (2 ppb) frequency accuracy over normal OTN systems.
Gap D.8.3: CPRI over OTN. See Clause 7.4.1 of the main body of this report.
8.4 New digital format replacing CPRI
The CPRI defines a very simple data link that was originally intended to operate over short (~100m)
fiber links running at ~1.25Gb/s rates. Its design was not optimized for use over a larger network.
Some examples of the inefficiencies in CPRI include:
It reused elements from 802.3 PHY clauses to define its optical and line coding methods. For
instance, 8b10b coding is used for rates 10 Gb/s and below, which is a 20% overhead.
The actual RF data (I and Q samples), CPRI also carries OAM information, at a fixed ratio of
1:15. While this was suitable for its lowest data rates, it becomes increasingly oversized for
higher rates (e.g, 10 Gb/s CPRI has ~600 Mb/s of OAM throughput!?)
The CPRI link is intended to be used for “line timing” of the RRU, and this, coupled with the
very strict radio regulations on channel assignment, makes the CPRI timing requirements very
strict.
Thus, some considerable improvements could be had if CPRI was revised to update its design to
reflect its new intended application.
Gap D.8.4: Improved CPRI. See Clause 7.4.1 of the main body of this report.
8.5 Radio over Packet
Current radio over X systems all use a circuit-based transport paradigm. It would be useful if the
radio information could be carried over a packet-based system, such as Ethernet, MPLS or IP. If
this were possible, then all of the different packet transport solutions could be used, giving the
network operators many more options.
In LTE, packet network devices are already widely used in the backhaul. Although in the fronthaul,
CPRI has more stringent delay, jitter and synchronization requirements than that in the backhaul,
but some new services in 5G may also have a very low E2E delay requirement, such as 1ms. In 5G,
fronthaul and backhaul may have similar requirements, and it would be useful to have an integrated
fronthaul / backhaul, carrying fronthaul traffic, backhaul traffic and even other types of traffic such
as IoT and WiFi traffic in a same network. An integrated fronthaul and backhaul will simply
network management and reduce OPEX.
The major issues encountered when sending radio data over packet networks include:
Fragmentation and encapsulation of the data stream
Circuit emulation in the face of typical packet impairments
Maintaining all the timing requirements simultaneously
- 149 -
TD 208 (PLEN/13)
There is some work to address these issues. The IEEE 802.1CM will develop a profile for Fronthaul
over Ethernet bridges. The IEEE TSN project proposes some solutions for precision timing and
reduced delay and jitter. The IEEE 1904.3 project is devising a Radio over Ethernet encapsulation
standard; however, that is the limit of its scope. The Next Generation Fronthaul Interface (NGFI)
group is just beginning work in this area.
Gap D.8.5: Radio over packet. See Clause 7.4.1 of the main body of this report.
8.6 Function Splitting in MFH
Re-allocation of the functions between the base station and the remote antenna site can reduce the
capacity required in MFH. Several function split points are under consideration as shown in Fig.
A.10. When the function split point is defined in a higher layer (at a more left point in the figure),
the required capacity becomes smaller, but it becomes difficult to realize Coordinated Multi-Point
(CoMP) transmission/reception.
The following options are possible split points:
(a) CPRI (conventional)
(b) Split PHY
(c) MAC-PHY
(d) Split MAC
(e) RLC-MAC
(f) PDCP-RLC
(g) Service
Fig. A.9. Options of function split and required capacity
To realize the future MFH with a new function split discussed above, we need a new signal format,
i.e. a frame. That can not only reduces the capacity in MFH compared with CPRI but also allows
various wire-line networks to be used as the base for the MFH. For example, Ethernet frame is one
of the candidates.
Gap D.8.6: Developing function splitting of front haul network. See Clause 7.4.1 of the main
body of this report.
Small capacity Large capacity
CPRIMAC-PHY Split PHYSplit MACRLC-MACPDCP-RLCService
PHY
RFlower
SPupper
SP
MAC
lowerupperRLCPDCP
BS side Remote antenna side
CoMP capabilityDPS, CS/CB(, JT) JT/JR
CoMP: Coordinated Multi-Point
DPS: Dynamic Point Selection
CS: Coordinated Scheduling
CB: Coordinated Beam forming
JT: Joint Transmission
JR: Joint Reception
RF: Radio Frequency
SP: Signal Processing
RLC: Radio Link Control
PDCP: Packet Data Convergence Protocol
CPRI: Common Public Radio Interface
- 150 -
TD 208 (PLEN/13)
8.7 Reuse of existing access networks
At present, broadband access with capabilities over 1 Gb/s are widely deployed in several countries.
The major relevant systems are G-PON, GEPON, XG-PON, and 10GEPON. These operate using a
TDM/TDMA scheme to share a single optical wavelength channel, and the systems provide generic
packet transport.
Of course, it would be beneficial to reuse as much of this infrastructure as possible. Using the
actual TDMA PON transmission system would require radio-over-packet style of interworking,
mentioned above. Even if that is not done, reusing the same fiber infrastructure would be good.
Overlaying wavelengths would be an example of this style of access network reuse. All of these
aspects have already been described in ITU recommendations, and so no standardization gap seems
to be present.
8.7.1 8. x Digital Radio (CPRI) over metro WDM (G.metro)
CPRI (or similar) interfaces can be transported over metro WDM system. ITU-T SG15 Q6 is
currently developing a recommendation G.metro, where a WDM technique transport systems defined
for metro applications. G.metro is targeted for applications where multiple services are delivered in
a carrier network. Initially, tuneable laser is used and later coherent technology may be supported.
Metro WDM (G.metro) network offers great bandwidth and capacity in addition to increasing single
port bandwidth and the wavelength counts that are multiplexed. Furthermore, the interface bitrate can
be 2.5G, 10G and 25G with reach up to 80km. For the bandwidth capacity, G.metro offers optical
wavelength grid of 100GHz and 50GHz spacing, resulting in 40 channels and 80 channels
respectively. In the future a narrower grid and greater channel counts could be achieved.
CPRI could be transported transparently in G.metro network without electronics encapsulation and
framing to meet strangent timing characteristics required by the mobile fronthaul network. G.metro
offers smallest latency and could provide optical layer protection mechanism service resilency.
Furthermore, port-agnostic function could simplify the configuration and OAM of access layer in
metro networks, and reduces the Capex and Opex.
G.metro supports horseshoe, chain and star topologies with WDM port-agnostic and independent
upgrade of every port/wavelength.
Gap D.8.7: Extension of G.metro for the transport of CPRI in MFH/MBH networks. See Clause
7.4.1 of the main body of this report.
9 Solutions for Mobile Backhaul
A backhaul network is fundamentally a simple packet-based data aggregation network. In the
conventional design of backhaul networks, the transport layer can be any number of packet
transport technologies, including Ethernet, WDM, OTN, PON, and wireless. All of the established
methods for management and control of such networks would continue to apply here, and there are
few gaps foreseen for MBH. The following sections highlight a few open areas where issues still
exist.
9.1 Network timing and synchronization in MBH
The MBH network must often provide a very accurate frequency and time reference signal.
Fortunately, there are several methods that have been developed to support this, most salient being
the IEEE 1588 Precision Time Protocol, and synchronous Ethernet. These methods can provide
time and frequency to a usable level of accuracy, and are in use today.
- 151 -
TD 208 (PLEN/13)
What is missing is the allocation of the overall timing budget over the network as a whole. The
MBH network is only one link in a much larger network. The IMT-2020 network has some overall
limits for timing performance, but it is not clear how much of these limits can be allocated to the
backhaul portion of the network.
9.2 Energy saving methods in MBH
As outlined in section 7.5, the power consumption of wireless networks will grow alarmingly if
measures are not taken to reduce them. In the case of backhaul transport, the most direct way to
reduce power consumption is with component technology improvements. Beyond that, the system
can take advantage of the fluctuations in backhaul utilization to save energy. This can be done in
several ways, as illustrated below.
9.3 Joint radio transport optimization
Fig. A.10. Sleep control of small cells associated with mobile
There is a case in which the terminal does not exist in the cell, since the area of the cell is reduced.
Therefore, always driving the cell is a waste of power. Thus, the guess function of the mobile and
sleep control are required.
Gap D.9.2.1: Coordination of power saving across MFH/MBH/Radio System. See Clause 7.4.1 of
the main body of this report.
9.4 Adjusting transport to follow traffic fluctuations
Figure A.11 shows fluctuations of mobile communication traffic by time of day. Actual traffic
greatly varies depending on the hour of day, with about 4 times difference between the max and
minimum according to the current statistics. Therefore, if operating at the max transmission rate all
the time, power ends up being wastefully consumed. By varying the number of operating transport
channels according to traffic capacity, power consumption can be reduced. In the case shown
Macro cell Small cell
Sleep
Wake up
Sleep
Sleep Sleep
Sleep
Sleep
Predict the direction
UE
- 152 -
TD 208 (PLEN/13)
below, perhaps about 40% of the transport power consumption can be saved on average.
Fig. A.11. Fluctuations of mobile communication traffic by time of day
Gap D.9.2.2: Power saving by resource optimization (See clause 7.4.1 of the main body of this
report.)
- 153 -
TD 208 (PLEN/13)
Appendix V
Emerging Network Technologies
Editor’s Note: Appendix V was produced during the FG-IMT 2020 focus group in order to
investigate gaps in standardization related to IMT-2020. While the request from SG-13 was to
deliver a report outlining standardization gaps, the consensus of the focus group was that the
working documents produced and used during the focus group work contained useful information
for future work and should be captured. Note, however, the focus group concentrated on producing
accurate descriptions of the standardization gaps in the main body of this document; some minor
errors may exist in the appendices. They are, however, the output of the focus group but are
provided for information only.
Editor’s Note: This appendix uses clause references in a form usually associated for normative text.
This is maintained for this report to align with references made in the main body of this report.
Draft deliverable of ICN for IMT-2020 Networks Working Group
1 Scope
This report explores the technology area Information Centric Networking (ICN) in the context of its
use in the IMT-2020 network and its potential for assuring that the IMT-2020 network meets its
visionary goals. The purpose of this paper is to identify the gaps related to ICN as an emerging
technology to guide the future studies by ITU-T Study Group 13.
2 References
<to be updated with ICN applicable references (if any) inserted>
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the
currently valid ITU-T Recommendations is regularly published.
The reference to a document within this Recommendation does not give it, as a stand-alone
document, the status of a Recommendation.
[ITU-T Y.3011] Recommendation ITU-T Y.3011 (2012), Framework of network virtualization for
future networks.
[ITU-T Y.3012] Recommendation ITU-T Y.3012 (2014), Requirements of network virtualization
for future networks.
[ITU-T Y.3033] Framework of data aware networking for future networks.
- 154 -
TD 208 (PLEN/13)
[Y.supFNDAN] Revised Draft of Y.supFNDAN – supplement to Y.3033 on scenarios and use cases
of data aware networking (July 13-25, 2015, Geneva).
The following ITU-R Draft Recommendations describes the to-date architecture of the trasnport
network of an IMT, including the radio network, the functions within a basestation, and
between different base stations and the mobile infrastructure.
[ITU-R M.IMT.ARCH] Working Party 5D (25 June 2015), Architecture and topology of IMT
networks
3 Definitions
Editor’s note: this clause is currently empty
4 Abbreviations and acronyms
This Recommendation uses the following abbreviations and acronyms:
CCN Content Centric Networking
NDN Named Data Networking
FIB Forwarding Information Base
PIT Pending Interest Table
CS Content Store
ICN Information Centric Networking
5 Conventions
None
6 Motivation for Information Centric Networking
6.1 Overview of ICN
Information Centric Networking (ICN) is a different approach to addressing and framing data than
today’s Internet Protocol (IP) semantics. In IP, one uses a source and destination address to identify
the two endpoints of a packet. The destination is almost always a unicast address and in a small
number of cases an anycast address; the use of IP multicast is very limited. Inside the network, the
payload of an IP packet is usually an arbitrarily framed byte stream (TCP) or datagrams (UDP).
TCP/IP assigns an ephemeral name to each packet: source IP, source port, destination IP,
destination port, byte offset, byte length. These names are not reusable, nor cacheable beyond use
for retransmission of lost packets. ICN’s approach is to assign a re-usable name to each packet or
small group of packets. This allows object re-use and peer-to-peer messaging via name without
needing to resolve endpoint identifiers beforehand. ICN also bundles object authenticity with the
network packets, such as via Merkel signing of a group of packets in a manifest, so provenance
stays with the objects even if cached.
There are several ICN architectures in active use today. The most widely known is Content Centric
Networking (CCNx) and its offshoot Named Data Networking (NDN). NDN forked from CCNx
around 2012. While there are several important protocol differences between NDN and CCNx, they
are close enough in function that we will only describe CCNx.
- 155 -
TD 208 (PLEN/13)
Because ICN does not require resolving endpoint identifiers before using a name, it opens new
possibilities in machine-to-machine and IoT applications. Today, IP-based applications must use
specialized rendezvous mechanisms, such as link broadcast, multicast, dynamic DNS, multicast
DNS, or SIP. This is because they must resolve an IP address for a desired name. ICN
technologies remove the IP abstraction so the network can operate at the name level. This can make
the network more responsive to application demands with less infrastructure.
Within a IMT-20205G RAN, ICN could serve as the object transport for intra-RAN data. For
example, the state of a Slice could be stored and transported as ICN objects, so as services move
between enodeB sites its state follows in the named ICN objects. ADD MORE POSSIBILITIES.
In the ICN technology CCNx, the name combines both a locator and identifier in to one routable
hierarchical structure. One could think of it as routing on URIs, where each name segment can be
arbitrary binary data not restricted to the URI syntax. At one end of the spectrum are pre-generated
content names, such as for a movie. A movie service could name content with a prefix like
/movie_service/superman/h264/768kbps/32kbps/English to indicate a codec and encoding rate.
Names can identify things beyond static content. A simple example would be a dynamic web
service, such as /book_store/home/<encrypted_account_identifier>, where the
<encrypted_account_identifer> is a blob that the book store server can understand and use to
generate a custom home page. Names could also indicate a type of calculation, for example
/calc/4/2/times could return a content object with the value “8”. In all these examples, we used
ASCII names, but in practice name segments can be binary values not necessarily human-readable.
<Introduction to ICN – motivation for a change to ICN-based communication model; relevance to
IMT-2020>
Figure 1 Draft architecture of 5G mobile network
6.2 Elements of ICN
An Information Centric Network is usually made up of content producers, content publishers,
content replicas, and content consumers. A producer generates a piece of content, such as a
document, photo, movie, or web page. It may have its own digital rights management (DRM)
attached by the producer. A publisher packages a piece of content for use in the network. This may
include pre-encoding the content to certain formats and names and signing them with a network
identity. A replica distributes content from a publisher. A consumer fetches content via network
names from replicas. The download process at a consumer understands the inherent security
offered by the ICN, which usually allows authenticating every packet via direct signature or implicit
hash chain from the publisher. This is different than today’s security model, where authenticity
derives from a secure connection to a replica. In the simplest configuration, one entity is a
producer, a publisher, and a replica for its content.
- 156 -
TD 208 (PLEN/13)
Figure 5. Typical ICN architecture
Figure 5 illustrates the typical ICN architecture, which we will make concrete by describing how an
actual instance of CCNx would handle these activities. In this example, a family videos an activity
at home, such as their baby. The video camera produces a structures MP4 byte stream. The
publisher function – which may reside on the camera, home gateway, or other device – segments
the byte stream to CCNx Content Objects. For a live stream like this, the publisher would segment
it to a certain number of video frames in some number of network packets (Content Objects). A
CCNx Manifest tree incorporates those Content Objects by hash in to a single signed manifest
representing the whole video segment. The video segment is stored on a first replica, such as a
home gateway. The publisher updates the movie catalogue to include the new segment, then
repeats for the next segment. A consumer queries its nearest replica for the movie catalogue and
segments. If the nearest replica does not have it, the request is forwarded towards the publisher
until satisfied. The content travels to the consumer, optionally cached at intermediate replicas.
As illustrated in Figure 5, a consumer may fetch the CCNx Content Objects from any replica and
still be assured that it is the correct data. This is because the Manifest tree is signed by the
publisher and then securely hash-linked to each data Content Object. The consumer and replica
may also opportunistically encrypt their session for privacy. The consumer may choose to only
trust replicas, for example, that are enumerated by the original content publisher or are provided by
the a trusted party, such as the user’s carrier or cloud service.
In a second example, a cell phone producing a video could be producer, publisher, and replica all in
one. Because one would not want a large number of consumers on the Internet fetching data
directly from one’s cell phone, it could be configured to only allow the user’s home media server to
fetch content and then act as the authoritative replica for the Internet. The user could choose to use
a carrier service (i.e. cloud-based media server) to act as the authoritative replica.
6.2.1 Requirements relating to ICN in IMT-2020
The 5G network architecture should yield a framework that allows the reshaping of the economic
foundation upon which the mobile network operates such that the new network can both efficiently
serve the emerging use cases and markets (eg IoT) and support current usage models (eg those that
ByteStream
CryptographicIden ty
Segmenta on
SignedSegments
Producer Publisher Replicas
NearestReplica
Consumer
- 157 -
TD 208 (PLEN/13)
are video related) at substantially lower cost points. Our expectation is that properly crafted, the
impact of a solution that successfully addresses these challenges would extend well beyond the
bounds of the mobile network. In the following paragraphs, we identify characteristics of the new
solution space that address the perceived deficiencies in current network design:
(1) Mobility – current networks base packet forwarding decisions on location-based labels that
identify the point-of-attachment of the destination host on the network. Whenever the host
point-of-attachment changes (ie a mobility event), a means for updating the association of
the host to its network-addressable label is required, one that also preserves the socket-based
connections that mobile applications are bound to. Mobile networks employ tunnel-based
solutions <ref GTP> for this purpose. Tunneling ensures reachability of mobile hosts via a
layer of indirection that allows the mobile host point-of-attachment label to change while
preserving the socket structure. One can view the necessity of anchoring gateways required
to implement and dynamically manage tunnel-connections as a direct consequence of
network design that builds on a foundational layer that was not architected to support
mobility. The current design burdens mobile traffic with an incremental cost that is traceable
to this architectural consequence, one that requires mobility be treated as an explicit feature
rather than as an emergent property of the basic design. The 5GIMT-2020 network should
remedy this deficiency and treat mobility as a first class citizen in its design and eliminate
the need for tunnelling and the associated complexity and cost that accompanies it.
(2) Privacy and Security – Privacy has always been a major concern for mobile networks. The
RAN has employed link-encryption by default since the second generation standards and
LTE commonly employs IP SEC in backhaul network between the eNB and PDN gateway
for protection along those connections. The importance of guaranteeing privacy on all
Internet services goes beyond the specific radio mobile data network or the all IP core; it
includes the communication service to all of its components: over-the-air transmission, end-
to-end IP, HTTP and web service that might employ user trackers or store private content in
clear text at the server end. The current solution guarantees authentication, integrity and
confidentiality by delegation to the transport layer on an end-to-end basis using TLS which
may serve a short term objective but at a cost of significantly impairing long-term
flexibility, reliability and manageability. The use of TLS implies a significant cost that is
quantifiable27 although it is the default solution in the HTTP/2.0 standard despite the
criticisms about its weaknesses as a technical solution to the privacy problem.
The issues regarding user privacy and data authenticity, integrity and confidentiality are
crucial to get defined accurately and addressed appropriately in the IMT-2020 basic design.
It is important to recognize from the outset that different applications, usage models, market
models, and so on will have diverse risk exposures that beget different security
requirements. It is unlikely we can successfully anticipate all potential combinations and it is
similarly unlikely that solutions that trend towards worst case coverage will be economically
acceptable. This suggests an architectural design that enables flexible application of security
elements appropriate to the application and usage requirement. The decomposition of
security in component functions (eg data authenticity, integrity, confidentiality) such that
each can be individually addressed is a desireable capability that allows the flexible creation
of purpose-directed security and privacy solutions that can address differing risk profiles
successfully within a cost-effective ecomomic model.
(3) Transport Efficiency – Reliable and stable transport over current networks is managed by a
distinct protocol layer (eg TCP, SCTP, etc) that operates between communicating end-
points. The end-to-end action of these protocols treat the composition of links that form the
27 D. Naylor et al, “The Cost of the “S” in HTTPS”, Proceedings of ACM CoNEXT, 2014.
- 158 -
TD 208 (PLEN/13)
communication path in aggregate that lead to the use of abstractions for congestion detection
and remedial action that lead to poor behaviour when applied to composite paths that
include wireless links. The anomalously erratic behavior exhibited by TCP in mobile
networks is traceable to the (mis)interpretation of variations in link bandwidth and latency
as a sign of network congestion resulting in inappropriate backoff responses, unnecessary
data retransmissions, increased download times and more generally inefficient usage of
wireless access and network resources. An architectural approach that enables hop-by-hop
congestion detection and management for accurate interpretation of link behaviour and
initiation of appropriate responses is desireable. This is particularly important in the case of
wireless links that employ (multiple access) link layer protocol may are highly adaptive and
designed to deliver high spectral efficiency. The objective is to have intrinsic congestion and
flow management mechanisms that account for the unique characteristics of the wireless
link.
Current tunnel-based mobility transport also frustrates the use of in-network storage and
caching of content within the mobility network. Caching should be viewed not simply as a
means for improving delivery efficiency of popular content but also in its roll in facilitating
retransmission and reducing latency when reliable delivery is required. The 5GIMT-2020
mobile network design should allow the flexible use of in-network storage as an
architectural component.
(4) Latency Sensitivity: 5GIMT-2020 places stringent requirement such as 1-10ms for certain
class of applications; also in general any applications benefits from reduced response time
through better throughput and faster service logic execution. Though delays such as 1-10ms
may be very difficult to achieve in software driven implementations, in normal situations
distance of the consumer from the service contributes significantly to the end-to-end
application delay. Though there are also tradeoffs to manage the distributed service
instances, benefits are also realized as overall load of the service is amortized among the
distributed instances. ICN features such as naming, name-based service discovery, name-
based routing allows application to discover the closest service points with which it can
transact. In certain situations, like IoT, these services can be placed at extreme edges of the
network such as over public infrastructure to address the need of mission critical
applications.
(5) (6) Bandwidth Efficiency: The estimated increase in wireless capacity is expected to be 1000X
for 5GIMT-2020. ICN can help this situation in multiple ways: 1) eliminating redundant
data transmission considering multicasting and caching is integral feature of ICN; 2) cheaper
computing and storage will enable significant intelligence end point and infrastructure
elements well suited for ICN to exploit, here ICN enabled application and service interaction
can be localized operating over both wired, unlicensed and licensed spectrum, thus
offloading the backhaul from any control or data plane overhead due to these interactions ;
3) also tighter integration of ICN with MAC layer to enable multicast and broadcast of data
objects can improve bandwidth efficiency of the wireless resources, particularly helpful for
very popular contents and flash crowd situations.
6.2.2 Design Goals (expected functionality, usefulness of the components)
- object security
- latency minimization
- hop-by-hop dynamic congestion control
- 159 -
TD 208 (PLEN/13)
- multipath transport
- optimized transport reliability
- mobility
- …
6.2.3 Recent Research/Experimental Results
<summary of recent research results that are relevant to IMT-2020>
- Mobile Backhaul optimization
- Mobile Congestion Management
- Content Distribution
- …
7 Use Cases
- <principle applications of CCN in IMT-2020 eg IoT, popular content, multicast, network
resource optimization, latency reduction, resilient networks/disaster recovery etc>
7.1 ICN- IoT
The “Things” referred to in an IoT framework belong to multiple scenarios and context making it
difficult to have a unified set of requirements that spans all the scenarios. However, an attempt has
been made in 28 to capture IoT requirements, though the priority of these requirements may be
different depending on a given scenario and its specific context. We summarize these general IoT
requirements and discuss why ICN meets these requirements. This discussion is also relevant
considering many recent proposals in the form of AllJoyn, IBM ADEPT, Google-Thread, and more
mature ZigBee/Zwave standards which tries to achieve one or more these requirements for specific
scenario like home network, hence doesn’t consider scenarios such as large scale mobility , or V2V
scenario where the architecture has to meet the disruption tolerant requirements of Ad Hoc
communication.
From an ICN-IoT implementation perspective several possibilities exist: 1) considering IoT
currently is highly fragmented with multiple protocol suites, inter-operability is a major concern.
ICN can be the unifying L3 protocol for the IoT operating because of the flexibility it offers in
operating over heterogeneous L24 interface making the case of an end-to-end ICN implementation,
the core ICN implementation itself may be overlaid over IP; 2) the other feasibility is using a
proprietary/standardized protocols such a Zigbee instrumented for simplicity and energy efficiency
in constrained segments, and applying ICN gateways to aid with information processing,
publication and consumption.
7.1.1. ICN-IoT Design Goals and Gap Analysis.
28 ICN based Architecture for IoT- Requirements and Challenges., " https://tools.ietf.org/html/draft-zhang-iot-icn-challenges-02 ", IETF/ICNRG 2015.
- 160 -
TD 208 (PLEN/13)
Here we discuss ICN-IoT requirements and gap analysis for each considering current research
status. In general it has to be understood that, ICN-IoT is an emerging area of research within the
ICN research space without any benchmark comparisons, hence the GAP analysis is presented as
open research challenges
Naming and Name Resolution: The first step towards realizing a unified IoT platform is the
ability to assign names that are unique within the scope and lifetime of each device, data items
generated by these devices, or a group of devices towards a common objective. In ICN-IoT, we
assign a unique name to an IoT object, an IoT service, or even a context. These names are
persistent throughout their scopes. These names are resolved to locations of these named entities by
the network as applications request access to them; this is termed as name resolution.
Research Gap : Naming is the fundamental design issue in ICN as it has to meet application
requirements, with direct implication on the design of the ICN network layer and name resolution
system. In the context of ICN, heterogenous radios and MTU restrictions offer another challenge of
naming the constrained devices such as sensor and actuators. Further considering hierarchical
nature of IoT deployment name translation may be required between local and global names for
end-to-end IoT solution enablement. This topic is an active area of study 29 and challenges have to
be addressed considering specific scenarios. Unlike static content in the general Internet, data
evolves contiuosly in IoT domain, also the consumers themselves may have different requirements
in terms of how the data has to be consumed5. While this is ok in push based ICN architectures like
Mobilityfirst6, it s a challenge in CCN/NDN7 architectures which is designed for PULL based
applications. Inter-connecting numerous IoT entities, as well as establishing reachability to them,
requires a scalable name resolution system considering several dynamic factors like mobility of end
points, service replication, in-network caching, failure or migration. The objective is to achieve
scalable name resolution handling static and dynamic ICN entities with low complexity and control
overhead.
Scalability: Scalability has to be addressed at multiple levels of the IoT architecture spanning
naming, security, name resolution, routing and forwarding level. In ICN-IoT, the name resolution
is performed at the network layer, distributed within the entire network. Thus, it can achieve high
degree of scalability exploiting features like content locality, local computing, and multicasting.
29 Claudio Compolo, Daniel Corujo et al “Information-centric Networking for Internet-of-things”, IEEE Networks, Jan , 2015.
4Baccelli, E. et al, "Information Centric Networking in the IoT:Experiments with NDN in the Wild", ACM-ICN SIGCOMM 2014
5 J. Quevedo et al, “Consumer driven Information Freshness Approach for Content Centric
Networking”, IEEE, NOM, 2014
6 NSF FIA project, MobilityFirst., "http://www.nets-fia.net/", 2010.
7Van Jacobson et al, “Networking Named Content”, ACM, CoNext, 2009
- 161 -
TD 208 (PLEN/13)
Research Gap: ICN scalability is another area of active research not only in the web content space
where one has to deal with billions of named content objects, but also in the IoT space where even
the number physical assets could be orders or magnitude greater. Further scalability is demanded
from the data generated by these devices. In addition a unified ICN-IoT framework has to deal with
mobility of end points, ad-hoc communication, migration of services and dynamic evolution of
content in the network. ICN is promising candidate to meet these challenges because of its inherent
ability to distribute intelligence leveraging name-based networking, contextualized communication
(e.g. scopes), caching , computing, and trust models to the level of D2D communications without
the unnecessary overhead of imposing centralized client-server communication models which IP
suffers from today. Scalability in IoT can also be handled considering hierarchical deployment
model of IoT applications where large number of named entities and thus data generated will have
only local significance without requiring global reacheability.
Resource efficiency: IoT devices can be broadly classified into two groups: resource-sufficient
and resource-constrained. In general, there are the following types of resources: power, computing,
storage, bandwidth, and user interface. In ICN-IoT, in both the constrained and non- constrained
parts of the network, light weight ICN stack over L28, along with features such as in-network
processing allows only data that are subscribed by applications in the specified context to be
delivered. Thus, it offers a resource-efficient solution.
8 Baccelli, E. et al, "Information Centric Networking in the IoT:Experiments with NDN in the Wild", ACM-ICN
SIGCOMM 2014
Research Gap: The challenge here is to develop light weight ICN network layer and associated
middleware9 to ensure long battery life while being aware of computation and memory limitations
of embedded systems. Also in general the overall initiative to make networking power efficient10
requires distributing computing intelligence so that data can be filtered at various points saving
significant router processing overhead otherwise spend on raw content transfer to the cloud as done
in IP today. Further another mode of achieving resource efficiency is leveraging flexible
deployment options of ICN as an end-to-end protocol, or applying well known resource efficient
solutions in the constrained segments, and applying more relatively complex ICN stacks in the
infrastructure.
Traffic Pattern. IoT traffic can be classified as local or wide area network scope depending on the
network context. Local traffic generation is due to D2D interactions or device-to-infrastructure
interaction during data push or pull operations. Wide area traffic contribution either through need
for distributing IoT data or interaction of end points with IoT services. In ICN-IoT, one can easily
cache data or services in the network, hence making more communications within local distances
and reducing the overall traffic volume, for example all the sensors and actuators in a building
management system (BMS) could self-organize, with minimal control plane support and without
manual configuration of each device.
Research GapPredicted traffic pattern in ICN is a projection of traffic patterns of known IP
applications today. In that sense, general ICN traffic pattern will only be known when there is wide
deployment of ICN networks and applications, which will also include applications unknown today.
Even considering today’s traffic pattern, significant communication can be localized without any
need for control plane infrastructure, for e.g. all the sensors and actuators in a building management
system (BMS) could self-organize, with minimal control plane support and without manual
- 162 -
TD 208 (PLEN/13)
configuration of each device. The research challenge here to understand these traffic patterns and
building scalable ICN-IoT middleware protocols that can self-organize in a local context, requiring
manual intervention at designated points in the network where policy restrictions and exposure of
the content or services are required to the external world.
Context-aware communications. . ICN exposes several contexts to the network beginning with
names to allow efficient inter-connection between the consumers and producers; this is in contrast
to transport networks like IP/MPLS where the network is not expected to use any application
context for its own benefit. Beyond names, many IoT applications shall rely on contextual
information such as social, relationships of owners, administrative groupings, location, type of
ecosystem (home, grid, transport etc.) of devices and data (which are referred to as contexts in this
document) to initiate dynamic relationship and communication. ICN-IoT supports contexts at
different layers, including device layer, networking layer and layer. Contexts at the device layer
include information such as battery level or location; contexts at the layer include information such
as network address and link quality; contexts at the application layer are usually defined by
individual applications. In ICN-IoT, device and network layer contexts are stored within the
network, while network elements (i.e., routers) are able to resolve application-layer contexts to
lower-layer contexts. As a result of adopting contexts and context-aware communications,
communications only occur under certain contexts that are specified by applications, which can
significantly reduce the entire network traffic volume.
Research Gap: Contextualized communication in ICN-IoT is a powerful feature which adds another
dimension of intelligence to the overall name-based communication model. For contexts to be
understood at the network layer, in-network computing has to be the key enabler. While it will not
be feasible to process every context relevant to all services in the network layer, abstraction of
contexts that a wide majority of applications can benefit from has to be supported. In this context,
efficient forwarder implementation with flexibility to process “well-understood” contexts and also
able to customize in-network processing through service “plug-ins” is desirable; a good example is
to enable big-data analytics only certain points in the network over certain stream of content
flowing through the forwarder. This area in general is an open area of research10,11 and will evolve
as ICN applications mature and are more widely understood. In addition in the area of ICN-IoT
security in the context of in-network processed data is another key consideration as data privacy and
regulation is of at most importance.
10 Y. Chen, A. Li and X. Yang, "Packet Cloud: Hosting In-Network Services in a Cloud-Like
Environment," Duke CS-TR-2011-10. 11M. Sifalakis, B. Kohler, C. Scherb, and C. Tschudin: An Information Centric Network for Computing the Distribution of Computations, 1st International ACM Conference in Information Centric Networking (ACM ICN 2014), September 2014, Paris, France.
Seamless mobility handling. Mobility in the IoT platform can mean 1) the data producer mobility
(i.e., location change), 2) the data consumer mobility, 3) IoT Network mobility (e.g., a body-area
network in motion as a person is walking); and 4) disconnection between the data source an
destination pair (e.g., due to unreliable wireless links). The requirement on mobility support is to be
able to deliver IoT data below an application's acceptable delay constraint in all of the above cases,
and if necessary to negotiate different connectivity or security constraints specific to each mobile
- 163 -
TD 208 (PLEN/13)
context. In ICN-IoT, ICN's name resolution layer should aid multiple levels of mobility relying on
receiver-oriented nature for self-recovery for consumers, to multicasting and late-binding
techniques to realize seamless mobility support of producing nodes.
Research Gap: Today mobility is restricted to mobile smart devices (phones, tablet etc.), but in a
unified ICN-IoT platform that includes transport vehicles, planes, ships etc. enabled with many
sensors and real-time reachability to these entities is critical at all times. Though ICN provides a
good abstraction to applications, as they bind to persistent IDs, ICN layer has to scale to
accommodate resolution of billions of mobile devices while meeting stringent application real-time
requirements, which includes 1-10ms delay requirements required in the IMT-2020 architecture.
Many distributed mobility techniques are being studied12,13,14,15 to handle named-entity mobility
which should also address the challenges of ICN-IoT applications as well. Also mobility handling
varies with specific ICN protocol fundamental design objectives[4], hence choices have to be
carefully made while enabling new features such as mobility in protocols like CCN.
12 Azgin, A., Ravindran, R., and G. Wang, "A Scalable Mobility-Centric Architecture for Named Data Networking.", ICCCN (Scene Workshop) , 2014.
13 Zhang, Y., Zhang, H., and L. Zhang, "Kite: A Mobility Support Scheme for NDN.", NDN Technical Report
NDN-0020 , 2014.
14 Jordan Auge, Giovanna Carofiglio et al, “Anchor-less Producer Mobility in ICN”, ACM-ICN, SIGCOMM,
2015.
15 Li, S., Zhang, Y., Dipankar, R., and R. Ravindran, "A comparative study of MobilityFirst and NDN based ICN-IoT ", IEEE, QShine, 2014.
Caching and Storage: Storage and caching plays a very significant role depending on the type of
IoT ecosystem, also a function subjected to privacy and security guidelines. In ICN-IoT, data are
stored locally, either by the mobile device or by the gateway nodes or at service points. Also in-
network storage/caching also speeds up data delivery.
Research Gap: While ICN’s distributed short term buffers allow immediate content distribution of
sensed and processed data and speed up data delivery16 , long term storage can be used to drive
analytics to allow efficient business processes. Also caching can be very useful in an ad hoc
scenario, such as V2V17 to provide DTN capabilities to end applications. In general the challenges
here are to allow application-centric caching techniques considering application priority, QoS
requirement such as latency or recovery due to mobility. Specific challenges apply to a given IoT
scenario where caching feature has to account for security requirements such as access control and
privacy. Caching has also been shown to be beneficial in constrained scenarios18, but its overall
usefulness considering data privacy and access control in constrained environment has to be further
studied. Another consideration toward caching is conflicting requirement by applications to have
access to the latest data or data within a certain specified freshness while the name of the latest data
by the producer is unknown by the consumer19. ICN is well suited to handle short term congestion,
transport over unreliable links, and long term delay tolerant communications challenges using the
caching/storage feature in the forwarders over every hop, providing reliable communications over
unreliable links.
16 Dong, L., Zhang, Y., and D. Raychaudhuri, "Enhance Content Broadcast Efficiency in Routers with Integrated Caching.", Proceedings of the IEEE Symposium on Computers and Communications (ISCC) , 2011.
- 164 -
TD 208 (PLEN/13)
17 Lucas Wang et al, “Rapid traffic information dissemination using named data”, ACM workshop on Emerging Name-oriented Mobile Networking design, 2012
18 Baccelli, E. et al, "Information Centric Networking in the IoT:Experiments with NDN in the Wild", ACM-ICN
SIGCOMM 2014.
19 J. Quevedo et al, “Consumer driven Information Freshness Approach for CCN”,IEEE NOM, 2014
Security and privacy. IoT security spans trust management challenges, security challenges
includes data integrity, authentication, and access control at different layers of the IoT platform.
Privacy means that both the content and the context around IoT data need to be protected. These
requirements will be driven by various stake holders such as industry, government, consumers etc.
In ICN-IoT, secure binding between application-centric names and content instead of IP addresses
to identify devices/data/services, is inherently more secure than the traditional IP paradigm 20.
Research Gap: Generally ICN’s object flexible security and trust models with intelligent network
level security enablement operating on name semantics and other metadata such as keys should
satisfy several ICN-IoT security functions related to authentication, integrity, access control and
privacy. Because of senstitivity of IoT data and physical assets, security and privacy should be
addressed in an end-to-end manner spanning control/forwarding/service plane interactions spanning
functions such as naming, in-network computing, name-resolution, routing, caching, and ICN-APIs.
The ability to cache content and apply in-network services is directly related to the security and
trust policies applied in the application layer, hence to enable ICN-IoT applications to operate over
an ICN network while satisfying application requirements is a challenge. Further in constraint
networks, where computing capacity is minimal light weight security and privacy implementations
are required, or other lower layer mechanism can be used where ICN level security is not possible.
These aspects are being studied in specific context like building management systems (BMS)21
and Healthcare22, but require a more broader study scope if multiple systems is to share the same
ICN infrastructure.
20 Nikander, P., Gurtov, A., and T. Henderson, "Host identity protocol (HIP): Connectivity,
mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks", IEEE
Communications Surveys and Tutorials, pp: 186-204, 2010.
21 Wentao Shang et al, “Securing Building Management Systems using NDN”, IEEE, Network,
2014
22 Jeff Burke, “NDN Network Environment: Open mHealth”
Communication reliability. IoT applications can be broadly categorized into mission critical and
non-mission critical. For mission critical applications, reliable communication is one of the most
important features as these applications have strong QoS requirements. Reliable communication
requires the following capabilities for the underlying system: (1) seamless mobility support in the
face of extreme disruptions (DTN); (2) efficient routing in the presence of intermittent
disconnection, (3) QoS aware routing, (4) support for redundancy at all levels of asystem (device,
- 165 -
TD 208 (PLEN/13)
service, network, storage etc.). ICN-IoT supports delay tolerant communications, which in turn
provides reliable communications over unreliable links.
Research Gap: ICN offers many ingredients for reliable communication such as multi-home
interest anycast over heterogenous interfaces, caching, forwarding intelligence for multi-path
routing leveraging state based forwarding in protocols like CCN/NDN. However these features
have not been analyzed from QoS perspective when heterogenous types of traffic is mixed in a
router, in general QoS for ICN is an open area of research. In-network reliability also come at the
cost of a complex network layer; hence the research challenges here is to build redundancy and
reliability in the network layer to handle wide range of disruption scenarios such as congestion,
short or long term disconnection, or last mile wireless impairments being aware of forwarding
performance tradeoffs and network layer complexity. Also ICN network should allow features such
as opportunistic store and forward mechanism to be enabled only at certain points in the network, as
these offer control and forwarding plane overhead affecting application throughput.
Ad hoc and infrastructure mode. Depending upon whether there is communication infrastructure,
an IoT system can operate either in ad-hoc or infrastructure mode. ICN-IoT supports both
applications operating in ad-hoc and infrastructure modes.
Research Gap: The challenge here is to realize a single ICN protocol which can operate in both
modes simultaneously, for e.g. a vehicle should be able to communicate with other vehicles in an ad
hoc manner, and be able to communicate with a wireless WAN infrastructure or RSU without
introducing any ICN gateways. This is quite realizable as information-centric nature of
communication which naturally allows unicast/multicast/broadcast modes of communication
between consumers and producers of information departing away from fixed session based
approach between hosts in IP.
Self Organization : The unified IoT platform should be able to self-organize to meet various
application requirements, especially the capability to quickly discover heterogeneous and relevant
(local or global) devices/data/services based on the context. This discovery can be achieved
through an efficient platform-wide publish-subscribe service 22, or through private community
grouping/clustering based upon trust and other security requirements. Here scope-based self-
organization is required to ensure logical isolation between the IoT subsystems, which should be
enabled at different levels device/service discovery 23,24 naming, topology construction, routing over
logical ICN topologies, and caching which in general is an open area of research25
22 Jiachen, C., Mayutan, A., Lei, J., Xiaoming, Fu., and KK. Ramakrishnan, "COPSS: An efficient content oriented publish/subscribe system", ACM/IEEE ANCS, 2011. 23 Ravindran, R., Biswas, T., Zhang, X., Chakrabort, A., and G. Wang, "Information-centric Networking based Homenet",IEEE/IFIP, 2013.
24 C. Westphal, B. Mathieu, O. Amin, A Bloom Filter Approach for Scalalbe CCN-based Discovery
of Missing Physical Objects, invited paper IEEE CCNC’16, Las Vegas, January 2016 25 Li, S., Zhang, R. Ravindran , Lijun Dong, Qinji Zhang, Y., Dipankar, R., and, G.Q.Wang, “IoT Middleware Architecture for Information-Centric Networking”, Globecomm, ICN Workshop, 2015.
- 166 -
TD 208 (PLEN/13)
Research Gap: General IoT deployments involves heterogeneous IoT systems or subsystems within
a particular scenario co-existing on the same wireless or wired infrastructure. Here scope-based
self-organization is required to ensure logical isolation between the IoTsubsystems, which should
be enabled at different levels device/service discovery, naming, topology construction, routing over
logical ICN topologies, caching which in general is an open area of research. These challenges
extended to constrained devices should be energy and device capability aware. In the infrastructure
intelligent name-based routing, caching, in-network computing techniques should be studied to
meet scope-based self-X needs of ICN-IoT.
In-network processing. IoT requires data processing at multiple levels ranging from
PAN/LAN/WAN etc, and this requires seamless placement of services and its discovery. In-
network computing enables ICN routers to host heterogenous services catering to various network
functions and applications needs. Contextual services for IoT networks require in-network
computing, in which each sensor node or ICN router implements context reasoning.
Research Gap: In-network computing increases the scalability and efficiency of the system, and
with ICN name-based anycast allows to place services any where in the network. This flexibility
also allows dynamic service placement based demand for various content and services. Generally
this requires the network infrastructure to support computing feature as an integral design of the
network layer, and this should be designed to not affect the forwarding capacity of the forwarder
itself. For a WAN scale ICN-IoT deployment, challenges related to service orchestration, resource
management, QoS to meet various ICN-IoT requirements have to be understood.
- Content Distribution
- Multicast (pseudo and real-time)
- …
8 Relationship/Coexistence with Mobile edge computing
8.1 ICN Mobile Edge Computing
ICN is a natural platform to deliver edge services. Its ability to host services, content, with other
features such as in-network processing, caching/storage, and multicasting/mobility allows
distributed service intelligence and large scale content distribution capability. A distinguishing
feature of ICN based edge service platform is contextualized service delivery. Such a platform will
manifest the idea of pushing the frontier of computing services and applications away from
centralized nodes to the logical extremes of the network. These edge-service realizations can be
located in the vicinity of the operator’s Central Office (CO) or at Points-of-Presence (PoP), or
eNodeB, or all the way into specific application context such as home networks or transport
infrastructure enabling local instantiation of ICN services to consumers, while providing global
service delivery through a unified ICN based service control infrastructure. Following points
motivates this realization:
ICN-MEC– ICN with SDN/NFV integration:
Though ICN is an ideal platform for efficient application delivery considering its features to adapt
to network disruptions and temporal evolution of services and content, these features also make
- 167 -
TD 208 (PLEN/13)
ICN a complex protocol if it were to be deployed to handle all network functions through
distributed control plane mechanisms. Instead ICN should explore design choices offered by
NFV/SDN 26 to handle network services like mobility or name resolution functions within practical
limits of scalability, which is mostly well handled within local domain scenarios. Further these core
ICN functions can be application driven paving way for ICN based service virtualization. Even
functions like service chaining27 is more a information-centric operation than host-centric which
can be handled by ICN, even in the context of IP flows. Even more service agility via service-
chaining can be realized over ICN transport with distributed service functions and dedicated
application controllers to aid Interest or Data processing through policy based paths determined by
the network services. The co-existance of ICN with SDN/NFV and realizing information-centric
service virtualization with rich contextualized content delivery in general is an open research topic.
Research Gap: Includes the areas of using base SDN/NFV for ICN slicing while realizing SDN-
ICN, NFV-ICN equivalent service planes. Realize ICN Centric Service Virtualization (compute,
bandwidth, cache, storage) over NFV-ICN. Realize ICN Centric Network Virtualization 28,29
logical/physical separation of ICN forwarder resources for heterogeneous ICN flows) over SDN-
ICN
26 Ravi Ravindran et al, “Towards Software Defined ICN Based Edge Cloud Services”, IEEE, CloudNet,
2013
27 Mayuthan Arumaithurai et al, “Exploiting ICN for Flexible Management of SDN”, ICN,
Siggcomm, 2014
28 A. Chanda, C. Westphal, D. Raychaudhuri, Content Based Traffic Engineering in Software
Defined Information Centric Networks, in IEEE INFOCOM Workshop NOMEN'13, April,
2013. pdf
29 A. Chanda, C. Westphal, ContentFlow: Mapping Content to Flows in Software Defined
Networks, in Proc. IEEE Globecom, December 2013 (arXiv preprint arXiv:1302.1493, January
2013). pdf
ICN-MEC – Service Contextualization: : Services are best delivered by locally customizing them
to what users want, because users who are located in different locations have different needs and
requirements based on their context. Context can be defined as any information that is used to describe
the state of an entity and can be classified as being user-, network-, service-, device- centric. Modeling
and reasoning of heterogeneous contextual information involves a trade off between complexity of
reasoning and expressiveness of data. Mapping the contextual information into service level and
network level requirements leads to the challenge of federated and standardized semantic
representation of state and context. On the other hand, users themselves access services through
heterogeneous devices, network connectivity, with subjective preferences. Moreover, mobility
considerations require services to be delivered from the best vantage point. An edge service
framework that can handle these dynamic requirements with minimum overhead is desirable. Context
of users and services can be inferred and semantics (meaning of data items within a context ontology)
of content predicates can be interpreted towards an intelligent dissemination of services and content
items. In addition to a physical view of network topology, ICN based services and applications can
benefit from a higher level perspective of topology.
- 168 -
TD 208 (PLEN/13)
Research Gap: Generally, ICN research has been limited to study fundamental networking issues
related to congestion control, name resolution, multicasting, caching using name-based networking.
In-network computing is another ICN dimension which can fundamentally distinguish it from IP
networking. This is so because, ICN deals with content objects with metadata associated for
security, temporal descriptions, application-centric metadata, which can be correlated with
consumer’s intent 30, 32; and conduct immediate transformation if the intent doesn’t satisfy the
available content. Modeling and reasoning of heterogeneous contextual information involves a trade
off between complexity of reasoning and expressiveness of data31. However the data transformation
also has security implications considering the content object based security model. Integration of
generic and application-centric in-network functions towards service contextualitzation to aid
security function offloading, transcoding, data aggregation and filtering is opegenerally an open
area of research.
30 P. Talebifard, R. Ravindran et al, “An Information Centric Networking Approach Towards Contextualized Edge Service “, IEEE, CCNC, 2015
31 P. Talebifard and V. Leung, “A Dynamic Context-Aware Access Network Selection for Handover in Heterogeneous Network Environments”, Proceedings IEEE INFOCOM Workshops, April 10-15, 2011 in Shanghai, P.R. China., pages 385–390.
32 F. Bronzino, S. Stojadinovic, C. Westphal, D. Raychaudhuri, Exploiting Network Awareness to
Enhance DASH over Wireless, IEEE CCNC, Las Vegas, January 2016
MEC Service APIs: ICN realizes a new transport using information-centric APIs, this directly
elevates the operator as an information-pipe rather than bit pipe provider. Operating an ICN platform,
makes the operator an active intermediary to satisfy information requests from consumers. Further
service virtualization features can be built over it using control and data plane to handle name
resolution, mobility, multicasting etc. From adoption perspective, ICN platform should offer
significant technical and business benefits through rich Service APIs to the operatorto services
compared to current existing infrastructure considering the the new CAPEX and OPEX in
investments towards deploying ICN, which is are still a topic of open
Research Gaps: Topics of research include Service-API for ICN deployment leveraging NFV/SDN
framework, SLA definitions for Services over an ICN platform
8.2 ICN Based Edge Service Framework:
<TBD>
9 Relationship/Coexistence with Network Slicing
9.1 Use of ICN for Inter-function transport
In the future IMT-2020 network, where a high degree of network function virtualization is expected
either explicitly in NFV or in network slices, the use of an ICN protocol for inter-function
communications is an attractive option because it decouples the location of services from the
- 169 -
TD 208 (PLEN/13)
service request. The concept of using ICN in NFV and SDN is studied in several academic
works30313233. ICN is well suited for service oriented routing, because each element in a service
chain can name the next element in the service chain without the need for an external name resolver
or manual configuration.
The initial deployment of virtualized functions inside a network Slice could use ICN technologies
immediately, as these are green-field services realized within a provider network34. Initial
implementations may require running ICN as a transport protocol over IP due to initial lack of
hardware support for native ICN transport, but this would be a transitional situation. Even when
running over an IP network layer, ICN services can still provide robust communications and
endpoint discovery using common existing IP techniques (e.g. mDNS, DNS SRV records, and
distribute rendezvous techniques, among others).
As data-plane programmable equipment enters the marketplace, native ICN slices and transport can
offer high-performance ICN/CCNx services. For example, abstracted 5G services in a CCNx slice,
such as MME, S-GW, and P-GW, could be implemented in software, in software with hardware
assist, or in deep-programmable hardware. In each case, the abstracted Slice service looks the
same, though each would offer different performance curves in terms of latency, throughput, and
capacity. Likewise, for inter-NFV communications, native wire-speed equipment, which is being
demonstrated in 2015 by some manufacturers, would improve throughput and flexibility compared
to using an IP-overlay, but should not limit such deployments within the 5G timeframe.
The advantage of using ICN as the inter-function transport protocol, even in a transitional period
over IP, is that it positions carriers to move to an ICN native approach, which can discovery,
recover, and utilize carrier networks efficiently without centralized bottlenecks or points of failure.
ICN approaches also position the carrier for dynamic service mobility and deployment without
needing to track an IP underlay.
30 Latre, Steven, et al. "The fluid internet: service-centric management of a virtualized future
internet." Communications Magazine, IEEE 52.1 (2014): 140-148.
31 Ravindran, Ravishankar, et al. "Towards software defined ICN based edge-cloud services." Cloud Networking
(CloudNet), 2013 IEEE 2nd International Conference on. IEEE, 2013.
32 TalebiFard, Peyman, et al. "Towards a context adaptive ICN-based service centric framework." Heterogeneous
Networking for Quality, Reliability, Security and Robustness (QShine), 2014 10th International Conference on. IEEE,
2014.
33 Nakao, Akihiro. "Software-defined data plane enhancing SDN and NFV." IEICE Transactions on Communications
98.1 (2015): 12-19.
34 Nakao, Akihiro. "Application Specific Slicing for MVNO through Software-Defined Data Plane
Enhancing SDN." IEICE Transactions on Communications ????.
- 170 -
TD 208 (PLEN/13)
9.2 Use of ICN function state migration
ICN is a good technology choice for function state migration and execution context migration in
future 5G networks . Content Centric Networking (CCNx) facilitates process migration while
enabling many desirable features such as strong checkpointing and data de-duplication. Not all
migration techniques require strong checkpointing, and in those cases CCNx offers a faster and
weaker naming technique that allows pages or blocks to go dirty in a checkpoint.
CCNx offers an intuitive naming of resources that are part of a service or execution context
migration and building checkpoints around those resources for consistent state transfer.
De-duplication is a technique where only one copy of data exists and it is shared between multiple
instances. CCNx allows resources to be de-duplicated both within and between virtual machine
instances. For example, in the previous discussion about using hash names for resources, if two
disk blocks, for example, have the same hash value they will refer to the same Content Object.
Only the block index in the CCNx manifest will be different.
A VM hypervisor may also share blocks between VMs. When generating the names used to fetch a
checkpoint, the source migration agent running in the source hypervisor could use a name like
{/nyc/host7, hash = 0x63223…} so any instance or any component can share the same data.
Assume that the memory page size and the disk block size are the same. Then that name for hash
0x63223… could be both a disk block and a RAM page of the same data (e.g. a shared library code
section). Because the manifest can point to different name prefixes for each hash and can indicate
the virtual resource of that hash, we can have the same physical bytes used for many purposes. This
approach may also be applied when page and block sizes are not the same by using smaller units of
naming.
9.3 Use of ICN for de-abstracting the network
In a traditional IP-based network, the Internet Protocol adds a level of abstraction to
communications endpoints by assigning them a location-dependent name. When applications wish
to communicate, they must rendezvous those host addresses – such as with DNS or SIP or some
other well-known means – before communication can take place. Because the rendezvous is done
outside the network layer, the rendezvous protocol must employ its own means to determine
locality – such as with ping triangulation – to determine which replica to use. Some applications
use IP anycast addressing to move rendezvous back in to the network layer and realize those
benefits. CCNx, as an ICN protocol, naturally keeps rendezvous on addresses within the network
layer so all applications can benefit from localized services without needing to add on additional
rendezvous layers with their own localization protocols.
ICN may be used as a de-abstraction layer for virtualized functions: using direct function naming in
ICN means the network can move functions and change routing without needing to update
intermediate abstractions of endpoint identification. For example, a single host IP address might
hide many virtualized functions, so it may not be possible to directly move an IP address. One
would need orchestration to inform components of a new socket endpoint, which could result in
service interruption during the time when a function has finished migration and the time when an
existing prior service is notified of a new service endpoint. With CCNx, the orchestration does not
- 171 -
TD 208 (PLEN/13)
need to inform prior components of a new service address, it only needs to update the named
routing to the new location.
Because CCNx, as an example ICN protocol, is not tied to the P-GW identity – such as for the
source endpoint address – it means that CCNx is well suited for multiple P-GW egress. Service
frameworks, such as Mobile Edge Computing, could realize significant simplification by using a
CCNx approach for multiple P-GW egress without needing to assign the UE multiple identities or
using layers of address translation.
9.4 ICN gaps related to Sotwareization
Gaps
3. Use of ICN within a slice would require ICN-aware components in the Slice, such as
specialized software or deep-programmable elements to execute the ICN protocol.
4. For ICN to be an effective rendezvous mechanism in the routing plane, the CRAN
would need to use the ICN protocol.
10 Identification of gaps
The following ICN gaps were identified. See clause 7.5.1 of the main body of this report of the FG-
IMT-2020 focus group for the detailed description.
Gap E.1: Considering ICN as a protocol for IMT-2020 Network
Gap E.2: Robust header compression for air interface (PDCP)
Gap E.3: Mobility anchoring (ICN aware S-GW)
Gap E.4: Mobility (ICN-aware MME)
Gap E.5: ICN Protocol (ICN-aware P-GW operation)
Gap E.6: ICN Protocol Execution (slice)
Gap E.7: Lawful intercept (specify what to capture)
Gap E.8: ICN mobility and routing
Gap E.9: ICN UE provisioning
Gap E.10: ICN managing IMT-2020 Self Organizing Network (SON)
Gap E.11: ICN – Operations and management (common interfaces)
Gap E12: Operations and management (SDN/Openflow)
Gap E.13: Security (authentication and encryption)
Gap E.14: Security (encryption)
Gap E.15: QoS (demand based)